• Title/Summary/Keyword: deception technology

Search Result 33, Processing Time 0.028 seconds

The Characteristics of Fashion Designer's Work Shown in Supermodern Environment (슈퍼모던 환경에서 나타나는 패션디자이너의 작품 특성)

  • Kim, Wan-Joo;Lee, Keum-Hee
    • The Research Journal of the Costume Culture
    • /
    • v.16 no.1
    • /
    • pp.100-114
    • /
    • 2008
  • The purpose of this study was to analyze the characteristics of supermodern fashion designer's work, which is shown by responding to supermodern environment where non-spaces such as road, railroad and airport are surplus in modern city environment. For the study, the researcher used existing study and specialized book basically and analyzed photograph materials by selecting them in specialized fashion book, internet site and designer's homepage. The results of this study showed that supermodern fashion design is the functional fashion responding to the change of time and space concept of supermodern society directly. As the common points of supermodern designer's works, first, they try to create private space enabling wearer to cope with risk caused by the environmental change and transitional space by adding architectural factor to fashion. Second, they display the design with protective function and metaphorical expression of concealment and deception in the supermodern environment where nonspace is increasing. Third, designers search the functional design from the aspect of fabric and detail while intending the technology in order to cope with supermodern environment.

  • PDF

A Study on portable voice recording prevention device (휴대용 음성 녹음 방지 장치 연구)

  • Kim, Hee-Chul
    • Journal of Digital Convergence
    • /
    • v.19 no.7
    • /
    • pp.209-215
    • /
    • 2021
  • This study is a system development for voice information protection equipment in major meetings and places requiring security. Security performance and stability were secured with information leakage prevention technology through generation of false noise and ultrasonic waves. The cutoff frequency band for blocking the leakage of voice information, which has strong straightness due to the nature of the radio wave to the recording prevention module, blocks the wideband frequency of 20~20,000Hz, and the deception jamming technology is applied to block the leakage of voice information, greatly improving the security. To solve this problem, we developed a system that blocks the recording of a portable smartphone using a battery, and made the installation of a separate device smaller and lighter so that customers do not recognize it. In addition, it is necessary to continuously study measures and countermeasures for efficiently using the output of the anti-recording speaker for long-distance recording prevention.

Development of Air to Air Mission Tactics for Manned-Unmanned Aerial Vehicles Teaming (공대공 교전을 위한 유무인항공기 협업 전술 개발)

  • Hwang, Seong-In;Yang, Kwang-Jin;Oh, Jihyun;Seol, Hyeonju
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.50 no.1
    • /
    • pp.47-57
    • /
    • 2022
  • UAVs have been deployed various missions such as deception, reconnaissance and attack since they have been applied in battlefield and achieved missions successfully instead of man. In the past, it is impossible for UAVs to conduct autonomous missions or cooperative mission between manned aircraft due to the limitation of the technology. However, theses missions are possible owing to the advance in communication and AI Technology. In this research, we identified the possible cooperative missions between manned and unmanned team based on air-to-air mission. We studied cooperative manned and unmanned tactics about fighter sweep mission which is the core and basic operation among various air-to-air missions. We also developed cooperative tactics of manned and unmanned team by classifying nonstealth and stealth confrontational tactics. Hereafter, we verified the validity of the suggested tactics using computer simulations.

How to Protect Critical Nodes of Megacities in Preparation for the Digitization of Spatial Information (공간정보 디지털화에 대비한 메가시티 핵심노드 방호 대책)

  • Sim, Jun Hak;Cho, Sang Keun;Park, Sung Jun;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.121-125
    • /
    • 2022
  • As the technologies of the 4th industrial revolution develops, spatial information is becoming digitized. Now, even with a smartphone, we can easily identify the location of national & military critical facilities located in the mega cities. As a result, mega cities' national & military critical facilities were exposed to not only traditional threats, but also non-traditional threats such as terrorism, cyber hacking, and criminal activities. This study suggests a way to protect national & military critical facilities of mega cities from such threats. Considering limitation of time & resources, protecting perfectly all national & military critical facilities is impossible, so we should focus on their critical nodes. Specifically, We suggest ways to protect the critical nodes by converging some measures such as design & arrangement in harmony with the surrounding environment, underground construction & covering, and visual deception. Transparency of digital spatial information will further increase with the advent of urban air mobility and autonomous vehicles in the future. Therefore, in order to prepare for future threats, we should take measures to minimize the exposure of critical nodes.

An Exploratory Study on the Advertising Display and Regulation Method of Native Advertising - Focus on Expert research by production practitioners - (네이티브 광고의 광고 표시 및 규제 방법에 대한 탐색적 연구 - 제작 실무자들의 전문가 조사를 중심으로 -)

  • Yu, Hyun Joong;Chung, Hae Won
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.455-462
    • /
    • 2022
  • This study attempted to examine the problems of the expression and format of native advertisements appearing on various platforms and to prepare a plan to regulate them. To this end, in-depth interviews were conducted to those in charge of advertising practice and examined. First, as a problem with the expression and format of native advertisements, it was considered that the congestion and deception of indiscriminate native advertisements appearing on various platforms could bring negative perceptions to consumers. For the second user's interaction, it was considered that customized advertising expressions through targeting by platform should be produced. Third, regarding the regulation of native advertisements, it was suggested that regulatory measures for consumer protection should be prepared and that market autonomy should be left to it. A strategic operation plan for native advertising according to various platforms should be prepared.

Black box-assisted fine-grained hierarchical access control scheme for epidemiological survey data

  • Xueyan Liu;Ruirui Sun;Linpeng Li;Wenjing Li;Tao Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2550-2572
    • /
    • 2023
  • Epidemiological survey is an important means for the prevention and control of infectious diseases. Due to the particularity of the epidemic survey, 1) epidemiological survey in epidemic prevention and control has a wide range of people involved, a large number of data collected, strong requirements for information disclosure and high timeliness of data processing; 2) the epidemiological survey data need to be disclosed at different institutions and the use of data has different permission requirements. As a result, it easily causes personal privacy disclosure. Therefore, traditional access control technologies are unsuitable for the privacy protection of epidemiological survey data. In view of these situations, we propose a black box-assisted fine-grained hierarchical access control scheme for epidemiological survey data. Firstly, a black box-assisted multi-attribute authority management mechanism without a trusted center is established to avoid authority deception. Meanwhile, the establishment of a master key-free system not only reduces the storage load but also prevents the risk of master key disclosure. Secondly, a sensitivity classification method is proposed according to the confidentiality degree of the institution to which the data belong and the importance of the data properties to set fine-grained access permission. Thirdly, a hierarchical authorization algorithm combined with data sensitivity and hierarchical attribute-based encryption (ABE) technology is proposed to achieve hierarchical access control of epidemiological survey data. Efficiency analysis and experiments show that the scheme meets the security requirements of privacy protection and key management in epidemiological survey.

Consumer Sentiment and Behavioral Intentions Regarding Dark Patterns in Online Shopping: Qualitative Research Approach (온라인 쇼핑의 다크패턴에 대한 소비자 감정 및 행동 의도: 질적연구를 통합 접근)

  • Hae-Jin Kim;Jibok Chung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.137-142
    • /
    • 2024
  • User interface (UI) functions are distorted and appear as a dark pattern that intentionally deceives or entices users. Consumers who are unaware of dark patterns are constrained in their choices, resulting in unnecessary economic damage. In this study, we aimed to investigate consumers' various shopping emotions and behavioral intentions after recognizing dark patterns in online shopping malls through qualitative research methods. As a result of the study, the rate of perception differed slightly depending on the type of dark pattern, and it was found that it induced consumer emotions such as distrust of the company, user deception, and displeasure. It has been found that the behavior after recognizing the dark pattern shows passive behaviors such as vowing to prevent recurrence and warning acquaintances rather than actively protesting to the company and demanding compensation for damages.

Susceptibility of Spoofing On A GPS L1 C/A Signal Tracking Loop (GPS L1 C/A 신호추적루프에서의 기만에 의한 영향)

  • Im, Sung-Hyuck;Im, Jun-Hyuck;Song, Jong-Hwa;Baek, Seung-Woock;Lee, In-Won;Lee, Dae-Yearl;Jee, Gyu-In
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.1
    • /
    • pp.32-38
    • /
    • 2011
  • In this paper, code and carrier tracking error which resulted from spoofing signal was analyzed by simulation. For a start, the types of spoofing signals and methods were classified. For the simulation, search spoofing method is assumed because a perfect position and velocity are not generally informed to spoofing device. In most cases, the tracking error is increased but a complete deception does not happen because of the inherent anti-spoofing characteristics of the GPS signal.

Analysis of the GPS Meaconing Signal Generator for the Live GPS L1 Signal (Live GPS L1 재방송 기만신호 생성 분석)

  • Kim, Taehee;Sin, Cheonsig
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.4
    • /
    • pp.15-20
    • /
    • 2016
  • In this paper, we developed the hardware GPS signal generator for generating a GPS L1 meaconing signal with Live GPS signal signals and analyzed the performance of meaconing signal generator thorough the experiment. Deception of the signal, such as a re-broadcast, it is an object of the user to provide false information so as not to receive location information and accurate time. The signal just rebroadcast has the features that can be easily deceive the receiver via a delay of no received signal to the signal processing through an antenna. In this paper, the hardware for generating a signal only these rebroadcast designed and manufactured, by re-sending the received Live GPS signals, to confirm the effect of the receiver. The maximum delay time is possible up to about 2.6msec, also, has been successfully tested to be moved to the position of re-broadcasting based on maturity antenna the position of the receiver through a spaced antenna.

The Security Vulnerabilities of 5G-AKA and PUF-based Security Improvement (5G 인증 및 키합의 프로토콜(5G-AKA)의 보안취약점과 PUF 기반의 보안성 향상 방안)

  • Jung, Jin Woo;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.3-10
    • /
    • 2019
  • The 5G network is a next-generation converged network that combines various ICT technologies to realize the need for high speed, hyper connection and ultra low delay, and various efforts have been made to address the security vulnerabilities of the previous generation mobile networks. However, the standards released so far still have potential security vulnerabilities, such as USIM deception and replication attack, message re-transmission attack, and race-condition attack. In order to solve these security problems, this paper proposes a new 5G-AKA protocol with PUF technology, which is a physical unclonable function. The proposed PUF-based 5G-AKA improves the security vulnerabilities identified so far using the device-specific response for a specific challenge and hash function. This approach enables a strong white-list policy through the addition of inexpensive PUF circuits when utilizing 5G networks in areas where security is critical. In addition, since additional cryptographic algorithms are not applied to existing protocols, there is relatively little burden on increasing computational costs or increasing authentication parameter storage.