• Title/Summary/Keyword: Social Threat

Search Result 246, Processing Time 0.027 seconds

Expectations and Anxieties Affecting Attitudes toward Artificial Intelligence Revolution (인공지능 혁신에 대한 기대와 불안 요인 및 영향 연구)

  • Rhee, Chang Seop;Rhee, Hyunjung
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.9
    • /
    • pp.37-46
    • /
    • 2019
  • Humans have anxieties as well as expectations for artificial intelligence. This study attempted to identify the expectation and anxiety factors affecting the attitude toward artificial intelligence innovation and to ascertain how much influence they have on current artificial intelligence innovation. This study considered that attitudes toward artificial intelligence may be different for each generation sharing a similar technology change culture. Therefore, the researchers limited the research subjects to I generation, which is the main users of artificial intelligence in the future. As a main result, the factors of expectiation of 'performance gain', 'positive social impact', and the factor of anxiety of 'threat to human-oriented social value' were drawn, and these factors influenced weak and strong artificial intelligence respectively. The results of this study suggests that artificial intelligence should develop into a pleasant relationship with humankind.

The Relationship between National Identity and Attitudes towards Immigrants - A Comparison of Korean, Chinese and Japanese University Students (국민정체성과 다문화태도의 관계-한·중·일 대학생을 중심으로)

  • Kim, Hyun-suk;Choi, Song-sik;Kim, Hee-Jae
    • Journal of International Area Studies (JIAS)
    • /
    • v.15 no.2
    • /
    • pp.141-168
    • /
    • 2011
  • The purpose of this study was to investigate the relationship between national identity and attitudes towards immigrants among Korean, Chinese and Japanese univ. students. The subjects were univ. students of Korean(433), Chinese (495) and Japanese(477). Data were analyzed by Factor analysis, ANOVA, Scheffe, Structural Equation Modeling, multi-group analysis. The results are following : First, ethnic and civic identity both was the highest in chinese univ. students. Ethnic identity was the lowest in Korean univ. students, and civic identity was the lowest in Japanese univ. students. Second, attitudes towards immigrants among Korean, Chinese and Japanese Univ. Students differed from items of perceived threat. Third, each sub-factor of national identity influenced mutual relation rather than independent on attitude towards immigrants. The impact of national identity on the attitudes towards immigrants, that of Japanese univ. students has significantly highest, but those of Korean and Chinese univ. students was not affected.

A Study on Sustainable Greenspace based on Urban Remodeling Design of an Old Apartment Building

  • Myung Sik Lee;Seung Ryeol Min
    • International Journal of High-Rise Buildings
    • /
    • v.12 no.2
    • /
    • pp.179-193
    • /
    • 2023
  • It is undeniable that urban greenspace is the soul of a city. Conventional urban greenspace such as parks, community gardens, playgrounds etc. located within a city reduce the negative effects of pollution, play a major role in the survival of the urban ecosystem, and promote healthy lifestyles. Today, 55% of the world's population lives in urban areas, which is expected to increase to 68% by 2050. Projections show that urbanization and the gradual migration to urban areas combined with the fast growth of the world's population, could add another 2.5 billion people to urban areas by 2050 and almost 90% of this increase will take place in Asia(UN, 2018). As a result, many plots in the cities are and will continue to be occupied with buildings to provide residential support to the increased population. This will dangerously decrease urban greenspaces. Moreover, worldwide, food crisis, energy crisis, and social crisis is posing a great threat to the existence of mankind. Additionally, the COVID - 19 has introduced a new lifestyle where from work culture to community configuration has drastically transformed. In this scenario, residential buildings will have to serve more than just providing privacy and shelter. As urban greenspaces are being occupied by concrete residential buildings, these buildings will have to compensate for the percentage of urban green they are destroying and the issues they are imposing in the process. The goal of this thesis is to design, architecturally define and, categorize comprehensive 'sustainable Greenspace'(S.G.S) for the multi-family housing scenario. These will be different than the conventional green (veranda, rooftop green) we commonly see in residential buildings. An old, dilapidated apartment building will be the target of remodeling to fulfill the purpose of this thesis.

Impact of Nuclear Tests on Deforestation in North Korea using Google Earth-Based Spatial Images

  • Ki, Junghoon;Sung, Minki;Choi, Choongik
    • Journal of People, Plants, and Environment
    • /
    • v.22 no.6
    • /
    • pp.563-573
    • /
    • 2019
  • The North Korean government conducted its first nuclear test in 2006 and more recently the sixth nuclear test on September 3, 2017. In order to identify how North Korea's nuclear tests have affected the environment, a scientific approach is required. Although North Korea's nuclear tests and their environmental destruction are not a severe threat to the environment of the Korean Peninsula at this time, identifying environmental damage and taking countermeasures in advance are essential to minimize their potential threats to the environments. The purpose of this study is to study the environmental impact of North Korea's nuclear tests using Google Earth image analysis. As a method of the study, we compare Google Earth images taken before and after each nuclear test was conducted in North Korea. To overcome limitations of the suggested comparison method, we cross-checked our results with those of previous scientific research. After the 1st-3rd nuclear tests, green spaces were found to be considerably reduced. In particular, when comparing the Google Earth images before and after the second nuclear test, some ground subsidences were observed. Such subsidences can cause tunnels on the mountainsides and cracks in rocks around the mountains, leading to the release of radioactive materials and contaminating groundwater. Besides, after the 4th-6th nuclear tests, decay and deforestation were observed not in the nuclear test sites, but in their surrounding areas. Especially after the 5th and 6th nuclear tests, the topography and the forests of the surrounding areas were severely damaged. In relation to North Korea's nuclear tests and their impact on the natural environment, we need to prepare various policy measures to reduce North Korea's environmental pollution and natural environment destruction. Those policy measures include the establishment of various cooperative governance between the Korean government, the private sector, the academia, NGOs, and international organizations.

A Study on Anomaly Signal Detection and Management Model using Big Data (빅데이터를 활용한 이상 징후 탐지 및 관리 모델 연구)

  • Kwon, Young-baek;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.287-294
    • /
    • 2016
  • APT attack aimed at the interruption of information and communication facilities and important information leakage of companies. it performs an attack using zero-day vulnerabilities, social engineering base on collected information, such as IT infra, business environment, information of employee, for a long period of time. Fragmentary response to cyber threats such as malware signature detection methods can not respond to sophisticated cyber-attacks, such as APT attacks. In this paper, we propose a cyber intrusion detection model for countermeasure of APT attack by utilizing heterogeneous system log into big-data. And it also utilizes that merging pattern-based detection methods and abnormality detection method.

EMICS: E-mail based Malware Infected IP Collection System

  • Lee, Taejin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2881-2894
    • /
    • 2018
  • Cyber attacks are increasing continuously. On average about one million malicious codes appear every day, and attacks are expanding gradually to IT convergence services (e.g. vehicles and television) and social infrastructure (nuclear energy, power, water, etc.), as well as cyberspace. Analysis of large-scale cyber incidents has revealed that most attacks are started by PCs infected with malicious code. This paper proposes a method of detecting an attack IP automatically by analyzing the characteristics of the e-mail transfer path, which cannot be manipulated by the attacker. In particular, we developed a system based on the proposed model, and operated it for more than four months, and then detected 1,750,000 attack IPs by analyzing 22,570,000 spam e-mails in a commercial environment. A detected attack IP can be used to remove spam e-mails by linking it with the cyber removal system, or to block spam e-mails by linking it with the RBL(Real-time Blocking List) system. In addition, the developed system is expected to play a positive role in preventing cyber attacks, as it can detect a large number of attack IPs when linked with the portal site.

Privacy Protection and RFID(Radio Frequency IDentification) (RFID와 프라이버시 보호)

  • Lee, Cheol-Ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.443-446
    • /
    • 2006
  • RFID is the core of realizing ubiquitous environment. This is expected to improve economical effect through related industry revitalization, make-work, and so on, in the future, and to be linked to social see-through enhancement via national life change. However unchecked RFID use lets retailers collect unprecedented huge information and they link it to customer information database, so the voice of worry to bring about a result of trampling down consumer privacy doesn't make a negligible situation. Although RFID system is spreaded out socially, the servicing of law and system is not accomplished to protect individuals from personal information violation threat. At the same time, in ubiquitous computing environment, to protect individual information efficiently, from the step of planning and deciding this technology system, constitutional law, norm, the basic legal rights of the people, and so forth is to be considered. The objective of the research is to persent the privacy protection from the viewpoints of law on RFID.

  • PDF

The Countermeasure for Threat of Cyber Terror in Sociological Perspective (사회적 이슈 관점에서 바라 본 사이버 테러 유형에 대한 위험 대응방안)

  • Choi, Heesik;Kim, Hyunkyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.59-67
    • /
    • 2017
  • In recent years, cyber terror that break into major institution's information system and destroy and paralyzed important information occurs frequently. Some countries do dangerous acts such as train hackers and order hackers to hack important industrial confidential documents which are core of national competitiveness to reduce the competitiveness of the country and cause social confusion. In this thesis, it will study problems of cyber terror to help people to use Internet in web environment that safe from cyber terror and to avoid the risk from cyber terror such as malware and DDos. This thesis is organized as following. In second chapter, it will look thorough the research that are related to cyber terror. In third chapter, it will study attack types of cyber terror. In fourth chapter, to defend from cyber violence, it will suggest safe solution. In fifth chapter, it will end with conclusion. Finally, to prevent urgent incidents like North Korean Cyber-attack, every Internet user must indicate their recognition on Internet security and it is significant to make a quick response treatment to create the safe online environment.

Research on the Environmental Issues in China's Sustainable Economic Development

  • Zhao, Yue
    • The Journal of Industrial Distribution & Business
    • /
    • v.7 no.1
    • /
    • pp.15-17
    • /
    • 2016
  • Purpose - During the past twenty years, China has developed rapidly in economy. Meanwhile China's economic development has brought great many problems. Sustainable development is to achieve coordination in the ecological, economic and social aspects. Among them, the environment and resource issues are the most critical issues which affecting sustainable development in China. With China's rapid economic development, China's ecological environment is facing the most serious threat in water pollution, air pollution, solid waste pollution and the destruction of forests and biodiversity, resulting in a significant loss of the national economy. This research aims to examine whether the tragedy of the commons has hindered the sustainable development of China's economy or not. On the other hand, we try to analyze a solution to improve this situation. Research design, data, and methodology - Theoretical background study, finding optimization models, and data analysis. Results - In the case of a clear definition of property rights, the air will have a market price. The market price will coordinate pollutant emissions. Conclusions - The tragedy of commons has hindered the sustainable development. The model of China's Economic development should be changed.

Implementation of File Security Module Using on Windows (윈도우즈 기반 파일 보안 모듈 설계 및 구현)

  • Sung Kyung;Yoon Ho-gun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.105-112
    • /
    • 2005
  • As the development of information telecommunication technology and thus the information sharing and opening is accelerated, If system is exposed to various threatener and the avrious security incident is rasing its head with social problem. As countermeasure, to protect safely and prepare in the attack for a system from a be latent security threat, various security systems are been using such as IDS, Firewall, VPN etc.. But, expertise or expert is required to handle security system. The module, implemented in this paper, is based on Windows XP, like Linux and Unix, and has effect integrity and non-repudiation for a file.

  • PDF