• Title/Summary/Keyword: Social Threat

Search Result 246, Processing Time 0.031 seconds

Countermeasures against Security Threats on Smart Device in Educational Institutions (교육기관에서의 스마트단말기 보안위협에 대한 대응방안)

  • In Ho Lee;Tae-Sung Kim
    • Journal of Information Technology Services
    • /
    • v.23 no.2
    • /
    • pp.13-29
    • /
    • 2024
  • Recently, with the rapid spread of mobile terminals such as smartphones and tablet PCs, social demand for mobile information security is increasing as new security issues that are difficult to predict as well as service evolution and lifestyle changes are raised. Smart terminals include smartphones, smart pads, chromebooks, laptops, etc. that provide various functions such as phone calls, text messages, Internet browsing, social media apps, games, and education. Along with the explosive spread of these smart terminals, they are naturally being used in our daily life and educational environment. In the mobile environment, behind the convenience of portability, there are more various security threats and vulnerabilities than in the general PC environment, and threats such as device loss, information leakage, and malicious codes exist, so it is necessary to take fundamental security measures at a higher level. In this study, we suggest ways to improve security by identifying trends in mobile smart information security and effectively responding to security threats to the mobile environment. In addition, it presents implications for various measures for effective class utilization along with correct security management methods and security measures related to the supply of smart devices that the Office of Education is promoting for schools at each level.

International Information Flow and Policy Issues (국제정보유통과 정책과제)

  • Kim Mee-Jean
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.26
    • /
    • pp.141-165
    • /
    • 1994
  • International information transfer has increasingly been a topic of concern since the 1970s and has been discussed in numerous forums, including the OECD, the UN, Unesco, and ITU. It is made possible by the convergence of computer and telecommunications technologies which has facilitated the transfer of machine-readeable information across national boundaries with unprecedented speed and efficiency. While information flow between nations occupies an increasing percentage of the population in advanced countries, the developing countries continue to experience information disparity. Yet even with this situation, information remains a major resource and commidity in international trade and commerce. Neither its value or its threat can be ignored by any nation. Both national and international information policy should be constructed with cognizance of the social, economic, cultural, and technological aspects of information.

  • PDF

Contribution of Ecological Surveys to Coastal Conservation: A Case in Soft Shore Study

  • Tai, K. K;Cheung, S.-G;Shin, P.-K.-S.
    • The Korean Journal of Ecology
    • /
    • v.27 no.3
    • /
    • pp.127-131
    • /
    • 2004
  • Soft shores are particularly vulnerable to human exploitation; however, they exhibit a variety of habitats which provide refuge for a diversity of flora and fauna. This study describes a survey of 13 soft shores in Hong Kong with information on species diversity, sediment characteristics, shore extent, pollution threat, degree of naturalness, linkage with other ecological habitats, and degree of social/economic importance. Data collected were subjected to multivariate statistical analyses, so as to identify shores that have significant ecological status and conservation value for management purposes.

Improvement of Logistics Service in Electronic Commerce (전자상거래에서의 물류서비스 개선방안)

  • Lee, Seung-Hui
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.05a
    • /
    • pp.525-544
    • /
    • 2004
  • The Purpose of this study is to examine logistics characteristics related to electronic commerce and to suggest improvement of logistics Service in electronic commerce. This paper concerns the logistics functions which are essential for completing a commerce process even under the EC environment and provides ways to improve the logistics performance. Electronic commerce have introduced two scenes; dramatic change of the existing distribution surroundings and noticeable achievement of the economic advance and social efficiency. But, in the same scene, electronic commerce can be a threat to business condition, especially logistics management. It suggests that for activation of EC it is necessary to strengthen the strategic alliances, introduce GPS and use the third party logistics positively to prepare for the settlements of traffic problems, support the introduction of integrated logistics service and logistics information system.

  • PDF

Trends in Supply-Chain Security Technologies (공급망 보안기술 동향)

  • Kim, Daewon;Kang, Dongwook;Choi, Yongje;Lee, Sangsu;Choi, Byeongcheol
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.4
    • /
    • pp.149-157
    • /
    • 2020
  • Security threats in supply-chains can be targeted at all the users who use products related to these supply-chains as well as at single equipment or individuals. This implies that these security threats can cause nationwide economic and social damages. In particular, it is true that hardware security threat analysis technology in supply-chains has significant technical barriers due to the lack of software knowledge as well as the need to study and understand undisclosed hardware designs. In this paper, we discuss the future direction of studies by introducing basic concepts and attack cases, along with domestic and foreign technology trends related to supply-chain security technology.

Effects of the Position of Demographic Questions on Survey Responses

  • Heo, Sun-Yeong
    • Journal of the Korean Data and Information Science Society
    • /
    • v.15 no.4
    • /
    • pp.855-866
    • /
    • 2004
  • In many surveys, one of the most important goals is to obtain reliable and valid responses from respondents. To achieve the goal, a researcher have to make efforts to protect respondents' confidentiality and to reduce the effects of social desirability on answers. The key question of this paper is whether the position of demographic questions have an effect on responses. Two types of questionnaires are considered: one puts the demographic questions at the beginning and the other does at the last. On both types, I asked only a small number of demographic questions which are considered as essential on analytic purposes. The results show no evidence of position effects when the risk to threat confidentiality was minimized.

  • PDF

An Efficient Content Sharing Scheme in Structured P2P Systems (구조적 P2P 시스템에서 효율적 컨텐트 공유 기법)

  • Bae, Joon-Hyun;Kim, Sang-Wook
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.6
    • /
    • pp.430-434
    • /
    • 2009
  • In this paper, we propose an efficient content sharing scheme for structured P2P overlay network. The main idea of this paper is to exploit the identified routing table instead of anonymous one using social relationships among nodes. The contribution of this paper is to present a means of mitigating the problem of 'free riding' and the threat of misrouting attack by malicious nodes.

The Psychological Impacts of Chemical, Biological and Radiological Disasters (화학, 생물, 방사능 사고의 정신적 영향)

  • Lee, Da Young;Sim, Minyoung
    • Anxiety and mood
    • /
    • v.13 no.1
    • /
    • pp.1-9
    • /
    • 2017
  • We reviewed the scientific literature on psychological effects of Chemical, Biological, Radiological, Nuclear, Explosive (CBRNE) disaster, which is one of the biggest threat to modern society. CBRNE disaster has the potential to cause specific physical symptoms and psychological distress in victims ; moreover, various toxic symptoms and carcinogenesis/mutation would be an important issue. Bioterrorism can cause localized outbreaks of infectious disease or pandemic disaster. Somatization as well as posttraumatic stress symptoms and depression are the characteristic psychological symptoms in CBRNE disaster's victims. CBRNE disasters could lead to large-scale public fear and social chaos due to the difficulties involved in verifying the extent of exposure and unfamiliar area to the common people. In the evacuation process, problems associated with adjustment and conflict between victims and residents should be considered.

Some suggestions for teaching Chinese speaking from the pragmatic perspective: Focused on directives in the Chinese textbooks (중국어 말하기 교육을 위한 몇 가지 화용론적 제언 - 교재 속 지시화행 분석을 중심으로)

  • Park, Chan Wook
    • Cross-Cultural Studies
    • /
    • v.27
    • /
    • pp.435-470
    • /
    • 2012
  • This paper aims to examine directives and its adjacency pair directives-responses in the Chinese textbook Hanyu Kouyu from the speech act theory, and give some suggestions for Chinese speaking instruction. For analysis of directives, it is important to consider context surrounding it at first. Context includes space for speaking, person who speak with, adjacent speech act, etc., so this paper considers context firstly before explaining directives and discusses how each element of context effects interpretation of its meaning. From the politeness perspective, directives and rejection as one of the responses are easy to be FTAs(face-threatening acts) fundamentally, so they are required to have some strategies for minimizing the threat, and it is found that there are strategies for positive face and negative face in the textbook. In the textbook, it is also examined that directives-responses contribute for interlocutor to accomplish social acts, for example, negotiating, insisting, maintaining, making alternative ideas, etc.

Future Trends of AI-Based Smart Systems and Services: Challenges, Opportunities, and Solutions

  • Lee, Daewon;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.717-723
    • /
    • 2019
  • Smart systems and services aim to facilitate growing urban populations and their prospects of virtual-real social behaviors, gig economies, factory automation, knowledge-based workforce, integrated societies, modern living, among many more. To satisfy these objectives, smart systems and services must comprises of a complex set of features such as security, ease of use and user friendliness, manageability, scalability, adaptivity, intelligent behavior, and personalization. Recently, artificial intelligence (AI) is realized as a data-driven technology to provide an efficient knowledge representation, semantic modeling, and can support a cognitive behavior aspect of the system. In this paper, an integration of AI with the smart systems and services is presented to mitigate the existing challenges. Several novel researches work in terms of frameworks, architectures, paradigms, and algorithms are discussed to provide possible solutions against the existing challenges in the AI-based smart systems and services. Such novel research works involve efficient shape image retrieval, speech signal processing, dynamic thermal rating, advanced persistent threat tactics, user authentication, and so on.