• Title/Summary/Keyword: Security Issues

Search Result 1,613, Processing Time 0.025 seconds

A Study on the Optimal Public Service for Environmental Satellite Observation data (환경위성 관측정보의 대국민 맞춤형 서비스 제공 방안 연구)

  • Choi, Won Jun;Eun, Jong Won;Kim, Sang-kyun;Choi, Gwang-Ho
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.4
    • /
    • pp.56-61
    • /
    • 2017
  • Recently, the satellite development project in Korea has been changing from demand to focus on various purposes. Especially, it is proposed to process satellite data from a simple terrestrial image observation satellite and to produce high value added information. In order to expand demand for satellite information, it is necessary to develop customized information and to provide information that reflects the needs of the final target population. In this study, we conducted a questionnaire survey and analyzed the results to analyze the requirements for the customized services of environmental satellites. As a result, the environmental satellites were found to have a low awareness due to the launch and operation, but they were highly aware of the recent environmental issues such as fine dust. In addition, they are aware of the necessity of developing independent environmental satellites because they have a strong desire for environmental security, and they prefer to provide materials through media that are easy to publicize and access through the media.

A Study on Smart Network Utilizing the Data Localization for the Internet of Things (사물 인터넷을 위한 데이터 지역화를 제공하는 스마트 네트워크에 관한 연구)

  • Kang, Mi-Young;Nam, Ji-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.6
    • /
    • pp.336-342
    • /
    • 2017
  • Traffic can be localized by reducing the traffic load on the physical network by causing traffic to be generated at the end of the packet network. By localizing traffic, the IoT-based sensitive data-related security issues can be supported effectively. In addition, it can be applied effectively to the next-generation smart network environment without changing the existing network infrastructure. In this paper, a content priority scheme was applied to smart network-based IoT data. The IoT contents were localized to efficiently pinpoint the flow of traffic on the network to enable smart forwarding. In addition, research was conducted to determine the effective network traffic routes through content localization. Through this study, the network load was reduced. In addition, it is a network structure that can guarantee user quality. In addition, it proved that the IoT service can be accommodated effectively in a smart network-based environment.

Study on Mechanism of Preventing Application Piracy on the Android Platform (안드로이드 어플리케이션 위변조 방지를 위한 방안 연구)

  • Lee, Kwang-Hyoung;Kim, Jae-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6849-6855
    • /
    • 2014
  • Recently, with the increasing use of smart phones, security issues, such as safety and reliability of the use of the Android application has become a topic to provide services in various forms. An Android application is performed using several important files in the form of an apk file. On the other hand, they may be subject to unauthorized use, such as the loss of rights and privileges due to the insertion of malicious source code of these apk files. This paper examines the Android environment to study ways to define the threats related to the unauthorized use of the application source code, and based on the results of the analysis, to prevent unauthorized use of the application source code. In this paper, a system is provided using a third body to prevent and detect applications that have been counterfeited or forged illegally and installed on Android devices. The application provides services to existing systems that are configured with only the service server that provides users and applications general, This paper proposes the use of a trusted third party for user registration and to verify the integrity of the application, add an institution, and provide a safe application.

The Study on Modification Methods of Residents Registration Number System (주민등록번호제도 변경방안에 관한 연구 : 주요 쟁점에 대한 인식조사를 중심으로)

  • Choi, Seong-Rak;Lee, Hye-Young
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.11
    • /
    • pp.128-138
    • /
    • 2016
  • On 23th December in 2015, Constitutional court of Korea decided the Resident Registration Act which could not changed one's Resident Registration Number was Unconformable to Constitution. And declared that the Resident Registration Act had to amend the article. This study analyzes the issues and preferences of people about the modification methods of Resident Registration Number System. In result, the residents agree on the autonomy of residents registration number change and prefer not including personal information to including personal information in registration number system. And the residents want to operate the Second number system besides resident registration number. However, they don't want to pay the change cost of resident registration number system. This results give a few of implications when the change methods of resident registration system would be prepared.

Research on Convergence of Internet-of-Things and Cloud Computing (사물인터넷과 클라우드 컴퓨팅의 융합에 대한 연구)

  • Choi, Kyung;Kim, Mihui
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.5
    • /
    • pp.1-12
    • /
    • 2016
  • Internet of Things (IoTs) technologies have been computerized information generated from a variety of objects and humans, and have been applied to various fields by connecting via the Internet. In order to compensate for the marginal characteristics of IoT smart devices, such as low-power, limited processing and capacities, combining IoT and cloud computing technologies is now established itself as one of the paradigms. In this paper, we look at the definition, features and services of IoT and cloud computing technology, and we investigate and analyze the conversing needs of IoT and could computing, existing conversion paradigms, convergence cases, and platforms. In results, there are challenges to be solved, even though the cloud technologies complement a number of restrictions of IoT and offer various advantages such as scalability, interoperability, reliability, efficiency, availability, security, ease of access, ease of use, and reduced cost of deployment. We analyze the new research issues of convergence paradigm, and finally suggest a research challenges for convergence.

An Analysis of News Coverage on the Filibuster for the Anti-Terrorism Act (테러방지법 필리버스터에 대한 언론의 보도태도 비교 분석)

  • Choi, Jinbong
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.9
    • /
    • pp.195-207
    • /
    • 2020
  • This study aims to analyze how the Korean liberal and conservative newspapers cover the filibuster for blocking the passage of the anti-terrorism act for the protection of citizens and public security by the main opposition party. For the comparative analysis of the Korean liberal and conservative newspapers, this study analyzes how the newspapers used news frame, news source, key word, and news theme. To analyze the effects on news coverage of the newspapers' ideological orientation, this study selects six newspapers: Hankyoreh Shinmun, Kyunghyang Shinmun, Ohmynews from liberal newspapers and Chosun Ilbo, Donga Ilbo, Joongang Ilbo from conservative newspapers. According to research findings, the liberal and conservative newspapers show clear distinction while using news frames when the newspapers cover the filibuster. The liberal newspapers cover the filibuster as a positive political action while the conservative newspapers cover the filibuster as a negative political action. In addition, as key word, "disturbance" is mentioned most by the conservative newspapers while "poisonous clauses" is used most by the liberal newspapers. As a result, this study shows that newspapers are influenced by ideological orientations while covering political issues.

A Study on Literature Based Philanthropic Education for Elementary School Students to Strengthen Their Democratic Citizenship (민주시민의식 함양을 위한 초등학생 문학 활용 나눔 교육 방안 연구)

  • Lim, Seong-Gwan
    • Journal of Korean Library and Information Science Society
    • /
    • v.46 no.1
    • /
    • pp.241-269
    • /
    • 2015
  • This study started from an understanding that a true welfare society requires voluntary 'sharing' of citizens in addition to the state's legal and institutional security and that to make the culture of sharing find a firm ground in our society, 'Philanthropic Education' is needed from the childhood. This study examined three issues; first suggested the need of philanthropic education and learning methods. secondly, to find out the present situations of sharing in Korea, the study looked into sharing cultures and philanthropic education in other countries. thirdly, the study explored ways of philanthropic education for elementary school students of Korea in literature based program methods. The structure of the program was designed as structured experimental group program. And the content of this program is composed of concepts, objects, process, institutions regarding philanthropy, and finally practical behavior of it. This study implies that discussions in taking root and revitalizing the philanthropic education to encourage prosocial behaviors of children by more efforts of family, community and school.

An Algorithm for Referential Integrity Relations Extraction using Similarity Comparison of RDB (유사성 비교를 통한 RDB의 참조 무결성 관계 추출 알고리즘)

  • Kim, Jang-Won;Jeong, Dong-Won;Kim, Jin-Hyung;Baik, Doo-Kwon
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.3
    • /
    • pp.115-124
    • /
    • 2006
  • XML is rapidly becoming technologies for information exchange and representation. It causes many research issues such as semantic modeling methods, security, conversion far interoperability with other models, and so on. Especially, the most important issue for its practical application is how to achieve the interoperability between XML model and relational model. Until now, many suggestions have been proposed to achieve it. However several problems still remain. Most of all, the exiting methods do not consider implicit referential integrity relations, and it causes incorrect data delivery. One method to do this has been proposed with the restriction where one semantic is defined as only one same name in a given database. In real database world, this restriction cannot provide the application and extensibility. This paper proposes a noble conversion (RDB-to-XML) algorithm based on the similarity checking technique. The key point of our method is how to find implicit referential integrity relations between different field names presenting one same semantic. To resolve it, we define an enhanced implicity referentiai integrity relations extraction algorithm based on a widely used ontology, WordNet. The proposed conversion algorithm is more practical than the previous-similar approach.

  • PDF

Survey and Analysis of Mobile B2B Demand (모바일 B2B 수요에 대한 조사 분석 연구)

  • Kim, Chul-Whan
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.2
    • /
    • pp.1-19
    • /
    • 2005
  • Due to the phenomenal growth in mobile internet users, mobile business as a type of applications of mobile internet has attracted the related industries' and academic researchers' attentions. However, most researchers focus on the issues of Mobile B2C collecting survey questions from consumers or internet users. This paper points out that Mobile B2B has distinct service sector and analyzes the current trend and demand of Mobile B2B in Korea by collecting survey questionnaire from specialists in mobile industries and people in universities and research institutes. Survey fields include business, market, contents/application, research and development and legal system. According to the survey results, Mobile B2B business will rise in distribution, finance, sales, and logistics industries from the beginning of 2005 using wireless PDA and the important preconditions will be security, certification, and standardization.

  • PDF

The Analysis of Factors that Affect Attitudes toward the New Digital Revolution (새로운 디지털 혁명에 대한 태도에 영향을 미치는 요인 분석)

  • Jun, Bong-Gi
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.333-339
    • /
    • 2014
  • In the late 2000's, a smart phone caused by the digital revolution has led to abrupt changes from our life. The internet of thing (IoT), which is considered as a next digital revolution, will be scrutinized in this paper. Students, who use smart phones in Silla University, were selected for the sample-frame. Approximately 78% students replied with a positive response to the digital revolution admit the new era with the intellectual curiosity and challenge. On the other hand, about 48% students showed uneasy response to the new civilization due to the lack of privacy and security issues of IoT; furthermore, friendship was their apprehension. This paper will provide potentially useful insights and directions for examining factors that affect different manners toward the next digital revolution.