• Title/Summary/Keyword: Web Site Security

Search Result 138, Processing Time 0.022 seconds

Investigation of Research Trends in Information Systems Domain Using Topic Modeling and Time Series Regression Analysis (토픽모델링과 시계열회귀분석을 활용한 정보시스템분야 연구동향 분석)

  • Kim, Chang-Sik;Choi, Su-Jung;Kwahk, Kee-Young
    • Journal of Digital Contents Society
    • /
    • v.18 no.6
    • /
    • pp.1143-1150
    • /
    • 2017
  • The objective of this study is to examine the trends in information systems research. The abstracts of 1,245 articles were extracted from three leading Korean journals published between 2002 and 2016: Asia Pacific Journal of Information Systems, Information Systems Review, and The Journal of Information Systems. Time series analysis and topic modeling methods were implemented. The topic modeling results showed that the research topics were mainly "systems implementation", "communication innovation", and "customer loyalty". The time series regression results indicated that "customer satisfaction", "communication innovation", "information security", and "personal privacy" were hot topics, and on the other hand, "system implementation" and "web site" were the least popular. This study also provided suggestions for future research.

A Study of Deformation Depicted on Moschino's Collection -Focusing on 2006~2010 Year Collection- (모스키노 컬렉션에 표현된 데포르마시옹에 관한 연구 -2006~2010년의 Collection을 중심으로-)

  • Lee, Jee-Yeon;Cho, Jean-Suk
    • The Research Journal of the Costume Culture
    • /
    • v.19 no.3
    • /
    • pp.488-500
    • /
    • 2011
  • [ $D{\'{e}}formation$ ]is one of the most important cultural factor which puts people at ease and gives a sense of security. This study, in the process, analyzes the works of Moschino. Moschino's designs are rated to have approached the sublime when it comes to transforming the psychological anxiety of everyday living into a laughter. After selecting one hundred-two of Moschino's designs from the Internet Web site(www.cft.or.kr, www.samsungdesign.net), this study examines and analyzes the characteristics and types of deformation found in them. The result as follows. The examination of deformation found in Moschino designs can be classified into a transformation, distortion, exaggeration, and illusion. Transformation, a conscious change of the existing form or function, was shown as the change of an existing position, form, function and designation of a new function. Distortion, an interpretation away from the reality or a "wrong interpretation," was shown by placing opposing factors in left-right position as an extreme asymmetry. Exaggeration, always beyond the realm of reality, was shown thorough an enlargement or a magnification of a specific part and a repetition of a detail factors. Illusion, through a distortion of reality results in something that looks new, was expressed through the effects of wearing a two-pieces, an expression of details, effects of wearing accessories, and an expression of a dynamism. Therefore, Moschino has reflected the desire of homo modern to transform the existing situation through many techniques of deformation.

A Probabilistic Load Balancing Scheme for Improving Service Quality of a Wireless Mesh Network (무선 메쉬 망의 서비스 품질 향상을 위한 확률적 부하 분담 기법)

  • Park, Jae-Sung;Lim, Yu-Jin;Ahn, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.375-382
    • /
    • 2008
  • As the use of Internet and information communication technology is being generalized, the SSL protocol is essential in Internet because the important data should be transferred securely. While the SSL protocol is designed to defend from active attack such as message forgery and message alteration, the cipher suite setting can be easily modified. If the attacker draw on a malfunction of the client system and modify the cipher suite setting to the symmetric key algorithm which has short key length, he should eavesdrop and cryptanalysis the encrypt data. In this paper, we examine the domestic web site whether they generate the security session in the symmetric key algorithm which has short key length and propose the solution of the cipher suite setting problem.

Worker Location Tracking System of Shipyard using Power Line Communication and Beacon (전력선 통신과 비컨을 활용한 선박 건조 현장의 작업자 위치 추적 시스템)

  • Taewoong Hwnag;Young-Doo Lee;Ki-Woong Park;In-Soo Koo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.41-49
    • /
    • 2024
  • This paper discusses the modeling and implementation of a worker location system at a shipbuilding site. The importance of worker location in an industrial environment is highlighted as a critical element in the prevention of industrial accidents. The paper presents a worker tracking system that integrates power line and beacon communication to accurately track worker position. Through experiments, the paper demonstrates how to monitor the changes in worker location based on different scenarios and how to access the status of worker location using the manager's web service. The paper can be used for the design of a system that will provide real-time location information to safety managers for the improvement of worker safety management.

Counter Measures by using Execution Plan Analysis against SQL Injection Attacks (실행계획 분석을 이용한 SQL Injection 공격 대응방안)

  • Ha, Man-Seok;Namgung, Jung-Il;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.2
    • /
    • pp.76-86
    • /
    • 2016
  • SQL Injection attacks are the most widely used and also they are considered one of the oldest traditional hacking techniques. SQL Injection attacks are getting quite complicated and they perform a high portion among web hacking. The big data environments in the future will be widely used resulting in many devices and sensors will be connected to the internet and the amount of data that flows among devices will be highly increased. The scale of damage caused by SQL Injection attacks would be even greater in the future. Besides, creating security solutions against SQL Injection attacks are high costs and time-consuming. In order to prevent SQL Injection attacks, we have to operate quickly and accurately according to this data analysis techniques. We utilized data analytics and machine learning techniques to defend against SQL Injection attacks and analyzed the execution plan of the SQL command input if there are abnormal patterns through checking the web log files. Herein, we propose a way to distinguish between normal and abnormal SQL commands. We have analyzed the value entered by the user in real time using the automated SQL Injection attacks tools. We have proved that it is possible to ensure an effective defense through analyzing the execution plan of the SQL command.

Development of Intelligent Job Classification System based on Job Posting on Job Sites (구인구직사이트의 구인정보 기반 지능형 직무분류체계의 구축)

  • Lee, Jung Seung
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.4
    • /
    • pp.123-139
    • /
    • 2019
  • The job classification system of major job sites differs from site to site and is different from the job classification system of the 'SQF(Sectoral Qualifications Framework)' proposed by the SW field. Therefore, a new job classification system is needed for SW companies, SW job seekers, and job sites to understand. The purpose of this study is to establish a standard job classification system that reflects market demand by analyzing SQF based on job offer information of major job sites and the NCS(National Competency Standards). For this purpose, the association analysis between occupations of major job sites is conducted and the association rule between SQF and occupation is conducted to derive the association rule between occupations. Using this association rule, we proposed an intelligent job classification system based on data mapping the job classification system of major job sites and SQF and job classification system. First, major job sites are selected to obtain information on the job classification system of the SW market. Then We identify ways to collect job information from each site and collect data through open API. Focusing on the relationship between the data, filtering only the job information posted on each job site at the same time, other job information is deleted. Next, we will map the job classification system between job sites using the association rules derived from the association analysis. We will complete the mapping between these market segments, discuss with the experts, further map the SQF, and finally propose a new job classification system. As a result, more than 30,000 job listings were collected in XML format using open API in 'WORKNET,' 'JOBKOREA,' and 'saramin', which are the main job sites in Korea. After filtering out about 900 job postings simultaneously posted on multiple job sites, 800 association rules were derived by applying the Apriori algorithm, which is a frequent pattern mining. Based on 800 related rules, the job classification system of WORKNET, JOBKOREA, and saramin and the SQF job classification system were mapped and classified into 1st and 4th stages. In the new job taxonomy, the first primary class, IT consulting, computer system, network, and security related job system, consisted of three secondary classifications, five tertiary classifications, and five fourth classifications. The second primary classification, the database and the job system related to system operation, consisted of three secondary classifications, three tertiary classifications, and four fourth classifications. The third primary category, Web Planning, Web Programming, Web Design, and Game, was composed of four secondary classifications, nine tertiary classifications, and two fourth classifications. The last primary classification, job systems related to ICT management, computer and communication engineering technology, consisted of three secondary classifications and six tertiary classifications. In particular, the new job classification system has a relatively flexible stage of classification, unlike other existing classification systems. WORKNET divides jobs into third categories, JOBKOREA divides jobs into second categories, and the subdivided jobs into keywords. saramin divided the job into the second classification, and the subdivided the job into keyword form. The newly proposed standard job classification system accepts some keyword-based jobs, and treats some product names as jobs. In the classification system, not only are jobs suspended in the second classification, but there are also jobs that are subdivided into the fourth classification. This reflected the idea that not all jobs could be broken down into the same steps. We also proposed a combination of rules and experts' opinions from market data collected and conducted associative analysis. Therefore, the newly proposed job classification system can be regarded as a data-based intelligent job classification system that reflects the market demand, unlike the existing job classification system. This study is meaningful in that it suggests a new job classification system that reflects market demand by attempting mapping between occupations based on data through the association analysis between occupations rather than intuition of some experts. However, this study has a limitation in that it cannot fully reflect the market demand that changes over time because the data collection point is temporary. As market demands change over time, including seasonal factors and major corporate public recruitment timings, continuous data monitoring and repeated experiments are needed to achieve more accurate matching. The results of this study can be used to suggest the direction of improvement of SQF in the SW industry in the future, and it is expected to be transferred to other industries with the experience of success in the SW industry.

A Survey of Needs and Types of Home Physical Therapy, Visiting Physical Therapy and School Physical Therapy (가정.방문물리치료 및 학교물리치료의 필요성 및 유형실태에 대한 조사연구)

  • Kwon, Hei-Jeoung
    • Journal of Korean Physical Therapy Science
    • /
    • v.18 no.4
    • /
    • pp.31-46
    • /
    • 2011
  • The purpose of this survey was to give data and information about type and needs of Home Physical Therapy, Visiting Physical Therapy and School Physical Therapy for physical and nurse. The subjects were 154(99 physical therapists and 55 nurses) who were working at geriatric rehabilitation hospitals and children hospitals. The period of questionary collection was from the 15 of August to the 15th of September 2011. And data was analysis from 99 articles such as journals related to physical therapy, and searched with keyword 'home and visiting physical therapy' by web site and Korea National Assembly Library from 1991 to 2011. The data was analysis with percentage, mean, standard deviation and ANOVA by SPSS PC 12.0. The results were as follows; 1. The definition of 'Home Physical Therapy' has been community based on physical therapy service for the patient who had diagnosis by medical doctor, has been based on medical law. The definition of 'Visiting Physical Therapy' has been community based on physical therapy service at home for the patient who had diagnosis by medical doctor, for the national basic living security, and senior citizen over 65 years who lives alone, has been based on law for community health and law of long term health insurance. The definition of 'School Physical Therapy' has been school based on physical therapy service at school after class for the disabled children who are studying at school, has been based on special education law article 28. 2. As for the knowledge of the Home and Visiting and School Physical Therapy, both groups PT and nurse were 'I do not know'125(81.3%) of the difference the concept of 3 definitions, so it means to need education and information about the different concept of three physical therapy. As for the needs of home and visiting physical therapy, both groups of PT and Nurse were 'needs' 151(98.1%). Physical therapist showed of 'Needs' on visiting physical therapy 35(35.4%), home physical therapy 32(32.3%), and schole physical therapy 32(32.3%). Nurse showed of 'Needs' on home physical therapy 23(41.8%). visiting physical therapy 19(34.5%), school physical therapy 13(23.6%). Therefore it is necessary to have home and visiting physical therapy as for the elderly and disabled person. 3. As for the qualification of Home and Visiting physical therapist, both PT and nurse groups showed as follows; take post graduation education program for home and visiting therapy after became PT : home physical therapist 108(70.1%), visiting physical therapist 106(68.8%). So it means education center or university can be developed post graduation program for home and visiting physical therapist. 4. As for the 'Needs' of school physical therapy, both groups of PT and nurse showed as follows; 'Needs' 142(92.2%), 'Needs superviser education program' 148(96.1%), in PT group showed 'I will participate of education program' 92(92.9%). 5. As for the present states of research papers or report of home, visiting, and school physical therapy was as follows; the 103 papers for 8 fields about' the needs of home and visiting physical therapy' from 1991 to 2011, the 13 papers for 2 fields about school physical therapy from 2001 to 2011, so total papers were 114 articles.

  • PDF

Development of Predicting Function for Wind Wave Damage based on Disaster Statistics: Focused on East Sea and Jeju Island (재해통계기반 풍랑피해액예측함수 개발 : 동해안, 제주를 중심으로)

  • Choo, Tai-Ho;Kwon, Jae-Wook;Yun, Gwan-Seon;Yang, Da-Un;Kwak, Kil-Sin
    • Journal of the Korean Society for Environmental Technology
    • /
    • v.18 no.2
    • /
    • pp.165-172
    • /
    • 2017
  • In current stage, it is hard to predict the scale of damage caused by natural disaster and it is hard to deal with it. However, in case of disaster planning level, if it is possible to predict the scale of disaster then quick reaction can be done which will reduce the damage. In the present study, therefore, function of wind wave damage estimation among various disaster is developed. Damage of wind wave and typhoon in eastern and Jeju coastal zone was collected from disaster report (1991~2014) published by Ministry of Public Safety and Security and to reflect inflation rate, 2014 damage cost was converted. Also, wave height, wind speed, wave direction, wave period, etc was collected from Meteorological Administration and Korea Hydrographic and Oceanographic Administration web site. To reflect the characteristic of coastal zone when wave damage occurs, CODI(Coastal Disaster Index), COSI(Coastal Sensitivity Index), CPII(Coastal Potential Impact Index) published by Korea Hydrographic and Oceanographic Agency in 2015 were used. When damage occurs, function predicting wind wave damage was developed through weather condition, regional characteristic index and correlation of damage cost.