• Title/Summary/Keyword: digital risk

Search Result 825, Processing Time 0.03 seconds

Internet Game Addiction and Emotional and Behavioral Characteristics in Upper Grade Elementary School Students and Middle School Students (인터넷 게임 중독에 있어서 초등학생 고학년군과 중학생군 간의 정서 및 행동특성의 차이)

  • Jeong, Hyeon;Park, Tae -Won;Lee, Seung-Ok;Lee, Sin-Hoo;Chung, Sang-Keun;Chung, Young-Chul;Yang, Jong-Chul;Cho, Eun-Cheong
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.21 no.2
    • /
    • pp.87-94
    • /
    • 2010
  • Objectives : This study was aimed at investigating the relationship between internet game addiction and emotional and behavioral characteristics of students both in the 5th and 6th grade of elementary school and in middle school. Methods : Two elementary schools and two middle schools were chosen to participate. The students completed selfreport questionnaires designed by the authors, called the Internet Game Addiction Scale, Korean youth self-report (K-YSR). Results : Compared to previous studies, the rates of those in the obvious game addiction group were much lower in this study. We defined the upper 10% of internet game addiction scores as a high risk user group and the lower 10% as a control group. There were significant differences between the groups with respect to the the ages at which internet gaming began, the frequency of game play per week, and the average length of each game playing session. Significant associations were also found between the level of internet game addiction and the withdrawn and delinquency subscales of the K-YSR. However, the association between game addiction and the withdrawn subscale was found only in middle school students. Conclusion : The findings from this study suggested that withdrawn and delinquent behaviors could be predictors of internet game addiction. Results also suggested the importance of early childhood intervention for preventing the development of more severe psychopathology in early adolescence.

A Study on The Preference Analysis of Personal Information Security Certification Systems: Focused on SMEs and SBs (개인정보보호 인증제도 선호도 분석에 관한 연구: 중소기업 및 소상공인을 중심으로)

  • Park, Kyeong-Tae;Kim, Sehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.911-918
    • /
    • 2014
  • Over the past few years, security breaches have been consistently reported around the world. Especially, people's personal information are at risk of being breached as the firms gather and utilize the information for their marketing purposes. As an effort to revamp their data infrastructures, companies have rebuilt their system that almost every data, including the personal information, are stored within the digital database. However, this migration provides easier access to the database but it has also increased the system vulnerability. As the data can be easily exposed to the unauthorized personnel both intentionally and unintentionally, it is necessary for companies to establish a set of security protocol and operate the personal information protection system. There are two major certified security system in South Korea; PIMS from KISA and PIPL from NIA. This paper analyzes the preferences of SMEs and small business using conjoint attributes of PIMS and PIPL. The study shows that the business owners take post certification rewards as the most important factor. It also shows that the attributes that have the highest utility rates are the following; 1) KISA certification, 2) 79 points of protection counter measurements, 3) 28 items of life cycle, 3) 50 percent discount on certification fee, and 4) Reduced amount of fine for personal information leakage incident.

An Exploratory Study on the Risks and Threats of SNS(Social Network Service): From a Policing Perspective (SNS(Social Network Service)의 위험성 및 Policing(경찰활동)에 미칠 영향에 대한 시론적 연구)

  • Choi, Jin-Hyuk
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.301-336
    • /
    • 2011
  • This exploratory study aims to review the risks and threats of social network services(SNSs), particularly focusing upon the policing perspective. This paper seeks to acknowledge the present risk/danger of SNSs and the very significance of establishing a strategic framework to effectively prevent and/or control criminal misuse of SNSs. This research thus advocates that proactive study on security issues and criminal aspects of SNSs and preventive countermeasures can play a significant role in policing the networked society in the time of digital/internet age. Social network sites have been increasingly attracting the attention of entrepreneurs, and academic researchers as well. In this exploratory article, the researcher tried to define concepts and features of SNSs and describe a variety of issues and threats posed by SNSs. After summarizing existing security risks, the researcher also investigated both the potential threats to privacy associated with SNSs, such as ID theft and fraud, and the very danger of SNSs in case of being utilized by terrorists and/or criminals, including cyber-criminals. In this study, the researcher primarily used literature reviews and empirical methods. The researcher thus conducted extensive case studies and literature reviews on SNSs. The literature reviews herein cover theoretical discussions on characteristics, usefulness, and/or potential danger/harm of SNSs. Through the literature review, the researcher also concentrated upon being able to identify a strategic framework for law enforcement to effectively prevent criminal misuse of SNSs The limitation of this study can be lack of statistical data and attempts to examine previously un-researched area in the field of SNS and its security risks and potential criminal misuse. Thus, to supplement this exploratory study, more objective theoretical models and/or statistical approaches would be needed to provide law enforcement with sustainable policing framework and contribute to suggesting policy implications.

  • PDF

An Investigation on Intellectual Structure of Social Sciences Research by Analysing the Publications of ICPSR Data Reuse (ICPSR 데이터 재이용 저작물 분석을 통한 사회과학 분야의 지적구조 분석)

  • Chung, EunKyung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.52 no.1
    • /
    • pp.341-357
    • /
    • 2018
  • Due to the paradigm of open science and advanced digital information technology, data sharing and re-use have been actively conducted and considered data-intensive in a wide variety of disciplines. This study aims to investigate the intellectual structure portrayed by the research products re-using the data sets from ICPSR. For the purpose of this study, a total of 570 research products published in 2017 from the ICPSR site were collected and analyzed in two folds. First, the authors and publications of those research products were analyzed in order to show the trends of research using ICPSR data. Authors tend to be affiliated with university or research institute in the United States. The subject areas of journals are recognized into Social Sciences, Health, and Psychology. In addition, a network with clustering analysis was conducted with using co-word occurrence from the titles of the research products. The results show that there are 12 clusters, mental health, tabocco effect, disorder in school, childhood, and adolescence, sexual risk, child injuries, physical activity, violent behavior, survey, family role, women, problem behavior, gender differences in research areas. The structure portrayed by ICPSR data re-uses demonstrates that substantial number of studies in Medicine have been conducted with a perspective of social sciences.

Head to Head Comparison of the Chun Nomogram, Percentage Free PSA and Primary Circulating Prostate Cells to Predict the Presence of Prostate Cancer at Repeat Biopsy

  • Murray, Nigel P;Reyes, Eduardo;Orellana, Nelson;Fuentealba, Cynthia;Jacob, Omar
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.6
    • /
    • pp.2941-2946
    • /
    • 2016
  • Background: The limitations of total serum PSA values remain problematic, especially after an initial negative prostate biopsy. In this prospective study of Chilean men with a continued suspicion of prostate cancer due to a persistently elevated total serum PSA, abnormal digital rectal examination and initial negative prostate biopsy were compared with the use of the on-line Chun nomagram, detection of primary malignant circulating prostate cells (CPCs) and free percent PSA to predict a positive second prostate biopsy. We hypothesized that men negative for circulating prostate cells have a small risk of clinically significant prostate cancer and thus may be conservatively observed. Men positive for circulating prostate cells should undergo biopsy to confirm prostate cancer. Materials and Methods: Consecutive men with a continued suspicion of prostate cancer underwent 12 core TRUS prostate biopsy; age, total serum PSA and percentage free PSA and Chun nomagram scores were registered. Immediately before biopsy an 8ml blood simple was taken to detect primary mCPCs. Mononuclear cells were obtained by differential gel centrifugation and identified using double immunostaining with anti-PSA and anti-P504S. Biopsies were classifed as cancer/no-cancer, mCPC detecton test as negative/positive and the total number of cells/8ml registered. Areas under the curve (AUC) for percentage free PSA, Chun score and CPCs were calculated and compared. Diagnostic yields were calculated with reference to the number of possible biopsies that could be avoided and the number of clinically significant cancers that would be missed. Results: A total of 164 men underwent a second biopsy; 41 (25%) had cancer; the AUCs were 0.65 for free PSA, 0.76 for the Chun score and 0.87 for CPC detection, the last having a significantly superior prediction value (p=0.01). Using cut off values of free PSA <10%, Chun score >50% and ${\geq}1$ CPC detected, CPC detection had a higher diagnostic yield. Some 4/41 cancers complied with the criteria for active surveillance, free PSA and the Chun score missed a higher number of significant cancers when compared with CPC detection. Conclusions: Primary CPC detection outperformed the use of free PSA and the Chun nomagram in predicting clinically significant prostate cancer at repeat prostate biopsy.

Comparative Analysis of CNN Deep Learning Model Performance Based on Quantification Application for High-Speed Marine Object Classification (고속 해상 객체 분류를 위한 양자화 적용 기반 CNN 딥러닝 모델 성능 비교 분석)

  • Lee, Seong-Ju;Lee, Hyo-Chan;Song, Hyun-Hak;Jeon, Ho-Seok;Im, Tae-ho
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.59-68
    • /
    • 2021
  • As artificial intelligence(AI) technologies, which have made rapid growth recently, began to be applied to the marine environment such as ships, there have been active researches on the application of CNN-based models specialized for digital videos. In E-Navigation service, which is combined with various technologies to detect floating objects of clash risk to reduce human errors and prevent fires inside ships, real-time processing is of huge importance. More functions added, however, mean a need for high-performance processes, which raises prices and poses a cost burden on shipowners. This study thus set out to propose a method capable of processing information at a high rate while maintaining the accuracy by applying Quantization techniques of a deep learning model. First, videos were pre-processed fit for the detection of floating matters in the sea to ensure the efficient transmission of video data to the deep learning entry. Secondly, the quantization technique, one of lightweight techniques for a deep learning model, was applied to reduce the usage rate of memory and increase the processing speed. Finally, the proposed deep learning model to which video pre-processing and quantization were applied was applied to various embedded boards to measure its accuracy and processing speed and test its performance. The proposed method was able to reduce the usage of memory capacity four times and improve the processing speed about four to five times while maintaining the old accuracy of recognition.

Study on File Recovery Based on Metadata Accoring to Linux Kernel (리눅스 커널에 따른 메타데이터 기반 파일 복원 연구)

  • Shin, Yeonghun;Jo, Woo-yeon;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.77-91
    • /
    • 2019
  • Recent Linux operating systems having been increasingly used, ranging from automotive consoles, CCTV, IoT devices, and mobile devices to various versions of the kernel. Because these devices can be used as strong evidence in criminal investigations, there is a risk of destroying evidence through file deletion. Ext filesystem forensics has been studied in depth because it can recovery deleted files without depending on the kind of device. However, studies have been carried out without consideration of characteristics of file system which may vary depending on the kernel. This problem can lead to serious situations, such as those that can impair investigative ability and cause doubt of evidence ability, when an actual investigation attempts to analyze a different version of the kernel. Because investigations can be performed on various distribution and kernel versions of Linux file systems at the actual investigation site, analysis of the metadata changes that occur when files are deleted by Linux distribution and kernel versions is required. Therefore, in this paper, we analyze the difference of metadata according to the Linux kernel as a solution to this and recovery deleted file. After that, the investigating agency needs to consider the metadata change caused by the difference of Linux kernel version when performing Ext filesystem forensics.

Designing the Record Management Functions for Record Content Using Advantages of Cloud Storage (클라우드 저장소 장점을 활용한 기록 콘텐츠 관리기능 설계)

  • Yim, Jin-Hee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.19 no.3
    • /
    • pp.271-292
    • /
    • 2019
  • Recently, the central administrative agency changed its business management system to cloud-based On-nara 2.0. To transfer and manage the records of the cloud business management system, the National Archives Service has developed and distributed a cloud-based records management system. It serves as an opportunity to maximize the benefits of cloud computing and redesign the records management to be more effective and efficient. The process and method of electronic record management can be transformed through digital technologies. First, we can change the transfer method for electronic records. When the business and the records management systems share the same cloud storage, it is possible to transfer the content files between the two systems without moving the contents files physically, thus copying only the metadata and reducing the cost and the risk of integrity damage. Second, the strategy for allocating storage space for contents can be conceived. Assuming that the cloud storage is shared by the business and the record management systems, it is advantageous to distinguish the storage location based on the retention period of the content files. Third, systems that access content files, such as records creation, records management, and information disclosure systems, can share the cloud storage and minimize the duplication of content files.

A Study for Comparison of Geometric Characteristics on Forearms for Improvement of Convinience in Splint Manufacturing with 3D Printing Technology (3D 프린팅 기술을 적용한 스플린트의 제작 용이성 향상을 위한 아래팔 기하 정보 비교에 관한 연구)

  • Chang, Ji Hong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.5
    • /
    • pp.475-481
    • /
    • 2019
  • A splint is one of assisting devices for the disabled with hemiplegia or contracture and is manually made by an experienced expert. Heated thermoplastic materials are continuously fitted to the affected part. This traditional method has a possible risk of low-temperature burn, quality variance of the splint due to the proficiency of maker. etc. While various approaches has been made using 3D printing technology in order to redeem those disadvantages, they still carry high cost issues with 3D scanners or accuracy issues with manual measurement. This research begins with symmetrical characteristics of human body and focuses on the preliminary study for the possibility of splint manufacturing with 3D printing technology based on geometric characteristics of unaffected arm. 3D right and left forearm models of healthy male adults were created by photogrammetry software and a series of digital images in order to measure the circumference and cross-sectional area of the forearm models at every 20mm from the elbow. The circumference and cross-sectional area showed tolerable levels of differences between both sides within subjects; The circumference and cross-sectional area showed very strong correlations between both sides within subjects. From these findings, the possibility of splint manufacturing with 3D printing technology could be confirmed based on the geometric characteristics of unaffected side.

Accuracy Analysis for Slope Movement Characterization by comparing the Data from Real-time Measurement Device and 3D Model Value with Drone based Photogrammetry (도로비탈면 상시계측 실측치와 드론 사진측량에 의한 3D 모델값의 정확도 비교분석)

  • CHO, Han-Kwang;CHANG, Ki-Tae;HONG, Seong-Jin;HONG, Goo-Pyo;KIM, Sang-Hwan;KWON, Se-Ho
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.23 no.4
    • /
    • pp.234-252
    • /
    • 2020
  • This paper is to verify the effectiveness of 'Hybrid Disaster Management Strategy' that integrates 'RTM(Real-time Monitoring) based On-line' and 'UAV based Off-line' system. For landslide prone area where sensors were installed, the conventional way of risk management so far has entirely relied on RTM data collected from the field through the instrumentation devices. But it's not enough due to the limitation of'Pin-point sensor'which tend to provide with only the localized information where sensors have stayed fixed. It lacks, therefore, the whole picture to be grasped. In this paper, utilizing 'Digital Photogrammetry Software Pix4D', the possibility of inference for the deformation of ungauged area has been reviewed. For this purpose, actual measurement data from RTM were compared with the estimated value from 3D point cloud outcome by UAV, and the consequent results has shown very accurate in terms of RMSE.