• Title/Summary/Keyword: Security Behavior

Search Result 899, Processing Time 0.025 seconds

A Reputation Compensation Protocol For Mobile Ad Hoc Networks (모바일 Ad hoc 네트워크를 위한 신용 평가 보상 프로토콜)

  • Lei, Zhu;Kang, Jeon-Il;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.35-44
    • /
    • 2006
  • The area of ad hoc networking has been receiving increasing attention among researchers in recent years and a variety of routing protocols targeted specifically at the ad hoc networking environment have been proposed. Selfish nodes are those which do not perform certain operations that the protocol specifies that they should, through a wish to conserve power. We propose a scheme as a mean to mitigate the detrimental effect of selfish nodes. We also propose a new area that might affect nodes' behavior - the environment's influence. In order to let nodes fairly be able to communicate in the networks we proposed solution to this problem. And our scheme can be applied to other reputation methods. We also contain the simulation results in our paper, and through the result, we can conclude that we can solve the problem by adding a little overhead.

Anonymous Qualification Verifying Method on Web Environment (웹 환경에서 익명성을 제공하는 자격증명 방법)

  • Lee, Yun-Kyung;Hwang, Jung-Yeon;Chung, Byung-Ho;Kim, Jeong-Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.181-195
    • /
    • 2011
  • There's a controversy about an invasion of privacy which includes a leakage of private information and linking of user's behavior on internet. Although many solutions for this problem are proposed, we think anonymous authentication, authorization, and payment mechanism is the best solution for this problem. In this paper, we propose an effective anonymity-based method that achieves not only authentication but also authorization. Our proposed method uses anonymous qualification certificate and group signature method as an underlying primitive, and combines anonymous authentication and qualification information. An eligible user is legitimately issued a group member key pair through key issuing process and issued some qualification certificates anonymously, and then, he can take the safe and convenience web service which supplies anonymous authentication and authorization. The qualification certificate can be expanded according to application environment and it can be used as payment token.

System Specification-based Design of Mobile Alarm System for Privacy Protection (시스템 명세화 기법 기반의 개인정보보호 모바일 알람 시스템 설계 및 구현)

  • Jang, Eun-Young;Kim, Hyung-Jong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.113-121
    • /
    • 2010
  • The system specification is a system theory based formal representation method for systems' structure and behavior modeling. When we make use of the system specification method in each step of software development, we can derive a hierarchical and modularized system design which enables us to manage the software development process flexibly. This research presents system specification based design of a mobile alarm system which sends alerts about illegal usage of private information and manages the response against the each alert. In our design of mobile alarm system, there are formal definition of alert message overcoming the functional limitation of mobile device and hierarchical modularized modeling of alarm processing using system specification. The efficiency of making use of the system specification is shown by applying the specification method to implementation of mobile alarm system. The contribution of this work is in design and implementation of mobile alarm system which enables us to handle the private information leakage situation more flexible way using system specification based software designing method.

Model Multiplicity (UML) Versus Model Singularity in System Requirements and Design

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.103-114
    • /
    • 2021
  • A conceptual model can be used to manage complexity in both the design and implementation phases of the system development life cycle. Such a model requires a firm grasp of the abstract principles on which a system is based, as well as an understanding of the high-level nature of the representation of entities and processes. In this context, models can have distinct architectural characteristics. This paper discusses model multiplicity (e.g., unified modeling language [UML]), model singularity (e.g., object-process methodology [OPM], thinging machine [TM]), and a heterogeneous model that involves multiplicity and singularity. The basic idea of model multiplicity is that it is not possible to present all views in a single representation, so a number of models are used, with each model representing a different view. The model singularity approach uses only a single unified model that assimilates its subsystems into one system. This paper is concerned with current approaches, especially in software engineering texts, where multimodal UML is introduced as the general-purpose modeling language (i.e., UML is modeling). In such a situation, we suggest raising the issue of multiplicity versus singularity in modeling. This would foster a basic appreciation of the UML advantages and difficulties that may be faced during modeling, especially in the educational setting. Furthermore, we advocate the claim that a multiplicity of views does not necessitate a multiplicity of models. The model singularity approach can represent multiple views (static, behavior) without resorting to a collection of multiple models with various notations. We present an example of such a model where the static representation is developed first. Then, the dynamic view and behavioral representations are built by incorporating a decomposition strategy interleaved with the notion of time.

Aesthetic Education of Young People As a Necessary Condition for Cultural Development of the Individual in Modern Conditions of the Information Society

  • Shevtsova, Olena;Tiutiunnyk, Mariia;Bosyi, Oleksandr;Zharovska, Olena;Patsaliuk, Iryna;Bielikova, Valentyna;Kuchai, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.207-213
    • /
    • 2022
  • The article reveals the problems of aesthetic education of young people as a necessary condition for the cultural development of the individual in the modern conditions of the information society. Aesthetic education should contribute to the formation of a creatively active personality. The basis of aesthetic education of young people in the modern conditions of the information society is the core of artistic culture - art as a unique form of public consciousness that contributes to the spiritual development and improvement of the inner world of a person. The main tasks of aesthetic education are highlighted. It is focused on the formation of aesthetic consciousness and aesthetic behavior of the individual. The formation of true aesthetic and spiritual values of students is impossible without a deep awareness of the national foundations of culture, which combines science (including technology), education, art, morality, way of life and worldview, and most importantly its information component - information culture. The effectiveness of aesthetic education of students largely depends on the skillful use of various methods and means by teachers. Aesthetic education of students involves a qualitative change in the level of their aesthetic culture in the modern conditions of the information society. In the era of information and computer technologies, the main Institute for aesthetic education of young people, as a necessary condition for the cultural development of the individual, is mass media. Television stands out especially because it has several information series (audio and video sequence), multiplied by the efficiency of providing information that increases several times compared to paper media, which allows you to report directly during the event.

Human Rights in The Context of Digitalization. International-Legal Analysis

  • Panova, Liydmyla;Gramatskyy, Ernest;Kryvosheyina, Inha;Makoda, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.320-326
    • /
    • 2022
  • The use of the Internet has become commonplace for billions of people on the planet. The rapid development of technology, in particular, mobile gadgets, has provided access to communication anywhere, anytime. At the same time, there are growing concerns about the behavior of people on the Internet, in particular, towards each other and social groups in general. This raises the issue of human rights in today's information society. In this study, we focused on human rights such as the right to privacy, confidentiality, freedom of expression, the right to be forgotten, etc. We point to some differences in this regard, in particular between the EU, etc. In addition, we describe the latest legal regulation in this aspect in European countries. Such methods as systemic, factual, formal and legal, to show the factors of formation and development of human rights in the context of digitalization were used. The authors indicate which of them deserve the most attention due to their prevalence and relevance. Thus, we concluded that the technological development of social communications has laid the groundwork for a legal settlement of privacy and opinion issues on the Internet. Simultaneously, jurisdictions address issues on every aspect of human rights on the Internet, based on previous norms, case law, and principles of law. It is concluded that human rights legislation on the Internet will continue to be actively developed to ensure a balance of private and public interests, safe online access and unimpeded access to it.

Money as a Polycontextual Value and Means of Self-Identification of a Modern Person: Traditional vs Virtual

  • S. Khrypko;Qi Yang;M. Kozlovets;I. Chornomordenko;M. Kolinko ;V. Havronenko;O. Lobanchuk;Н. Salo
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.1-12
    • /
    • 2023
  • The article examines the axiological psycho-philosophical understanding of the phenomenon of money and its value role in modern society. The traditional and virtual context of the representation of the money phenomenon is considered.Following the ideas of G. Simmel, the authors consider money not only as a purely economic, but also a psycho-philosophical, cultural and social phenomenon. Money appears as a result of cultural development of the world and gradually forms a monetary culture as a space of economic and social interaction of people. Under the influence of the monetary culture of one or another historical period, the character of a person's economic activity, values and life orientations are formed. Modern money culture is often called financial civilization. Peculiarities of modern monetary culture are studied, its main features and problems are determined in the article. The problem of the peculiarities of the constructive and destructive attitude of the individual towards money is identified; a psycho-philosophical and cultural-identification typology of people is described, which is based on clinical observations and interpreted through the prism of psychoanalytic theory. The concept of money is highlighted from the standpoint of a social-psychological approach. The theoretical foundations of money's influence on the decision-making process and human behavior are also revealed.

Experimental and Numerical Study on the Dynamic Fracture Processes of PMMA Block by NRC Vapor Pressure Fracture Agent (NRC 증기압 암석 파쇄제에 의한 PMMA 블록의 동적 파괴 과정에 관한 실험 및 수치해석적 연구)

  • Gyeongjo Min
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.1
    • /
    • pp.91-103
    • /
    • 2023
  • This study aims to investigate the dynamic fracture characteristics of rocks and rock-like materials subjected to the Nonex Rock Cracker (NRC), a vapor pressure crushing agent that produces vapor pressure by instantaneously vaporizing a liquid mixture crystallized through the thermite reaction. Furthermore, the study seeks to develop an analytical technique for predicting the fracture pattern. A dynamic fracture test was performed on a PMMA block, an artificial brittle material, using the NRC. High-speed cameras and dynamic pressure gauges were employed to capture the moment of vapor pressure generation and measure the vapor pressure-time history, respectively. The 2-dimensional Dynamic Fracture Process Analysis (2D DFPA) was used to simulate the fracture process caused by the vapor pressure, with the applied pressure determined based on the vapor pressure-time history. The proposed analytical method was used to examine various fracture patterns with respect to granite material and high-performance explosives.

LSTM based Supply Imbalance Detection and Identification in Loaded Three Phase Induction Motors

  • Majid, Hussain;Fayaz Ahmed, Memon;Umair, Saeed;Babar, Rustum;Kelash, Kanwar;Abdul Rafay, Khatri
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.147-152
    • /
    • 2023
  • Mostly in motor fault detection the instantaneous values 3 axis vibration and 3phase current in time domain are acquired and converted to frequency domain. Vibrations are more useful in diagnosing the mechanical faults and motor current has remained more useful in electrical fault diagnosis. With having some experience and knowledge on the behavior of acquired data the electrical and mechanical faults are diagnosed through signal processing techniques or combine machine learning and signal processing techniques. In this paper, a single-layer LSTM based condition monitoring system is proposed in which the instantaneous values of three phased motor current are firstly acquired in simulated motor in in health and supply imbalance conditions in each of three stator currents. The acquired three phase current in time domain is then used to train a LSTM network, which can identify the type of fault in electrical supply of motor and phase in which the fault has occurred. Experimental results shows that the proposed single layer LSTM algorithm can identify the electrical supply faults and phase of fault with an average accuracy of 88% based on the three phase stator current as raw data without any processing or feature extraction.

The Effect on the IS Role Stress on the IS Compliance Intention Through IS Self-determination: Focusing on the Moderation of Person-organization Fit (정보보안 역할 스트레스가 자기 결정성을 통해 준수 의도에 미치는 영향: 개인조직 적합성의 조절 효과)

  • Hwang, In-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.2
    • /
    • pp.375-386
    • /
    • 2022
  • As information asset protection is recognized as an important management factor for organizations, organizations are increasing their investments in information security(IS) policies and technologies. However, strict application of IS may cause non-compliance behavior through IS stress on employees of the organization. Accordingly, this study suggests a mechanism by which employee stress affects IS compliance intentions through self-determination, and a method to reinforce IS compliance intentions through person-organization fit. We conducted an online survey of employees working at companies that adopted IS policies and tested hypotheses using 475 samples. First, as a result of analyzing the main effects of applying the structural equation model, role stress affected IS compliance intention through self-determination. Second, as a result of analyzing the moderating effect of applying Process 3.1, personal organization fit strengthened the relationship between self-determination and IS compliance intention. The research suggests a direction for achieving internal IS goals by confirming the influence of IS stress and behavioral causes of employees.