• Title/Summary/Keyword: eCard

Search Result 270, Processing Time 0.021 seconds

A Study on Parents' View of the Augmented Reality Card Use for Pr e-School Education

  • Deng, Qianrong;Cho, Dong-min
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.6
    • /
    • pp.838-848
    • /
    • 2021
  • Parents' influence on children's development is generally considered essential. This paper attempts to explore the role of AR in preschool education from the perspective of parents, aiming to help parents better understand the impact of children's use of augmented reality in preschool education. The subjects were parents of children in the preschool age range (3-6 years old), and the experimental equipment was AR cognitive cards. In order to extract parents' views on AR, five parents were invited to conduct an experiment with their children using AR cognition cards, and then an open interview survey was conducted. In the second experiment, the answers obtained from the first experiment were sorted out and formed a questionnaire to conduct a closed-book survey. It shows that parents are satisfied with the characteristics of AR to assist their children's learning. At the same time, parents also value technology, usage management and playing environment. AR can stimulate children's learning initiative. Children like to use AR, AR is suitable for learning, make parents satisfied. But even if AR is suitable for learning, parents will control the time their children use it.

How Do Children Interact with Phishing Attacks?

  • Alwanain, Mohammed I
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.127-133
    • /
    • 2021
  • Today, phishing attacks represent one of the biggest security threats targeting users of the digital world. They consist of an attempt to steal sensitive information, such as a user's identity or credit and debit card details, using various methods that include fake emails, fake websites, and fake social media messages. Protecting the user's security and privacy therefore becomes complex, especially when those users are children. Currently, children are participating in Internet activity more frequently than ever before. This activity includes, for example, online gaming, communication, and schoolwork. However, children tend to have a less well-developed knowledge of privacy and security concepts, compared to adults. Consequently, they often become victims of cybercrime. In this paper, the effects of security awareness on users who are children are investigated, looking at their ability to detect phishing attacks in social media. In this approach, two Experiments were conducted to evaluate the effects of security awareness on WhatsApp application users in their daily communication. The results of the Experiments revealed that phishing awareness training has a significant positive effect on the ability of children using WhatsApp to identify phishing messages and thereby avoid attacks.

Executive function and Korean children's stop production

  • Eun Jong Kong;Hyunjung Lee;Jeffrey J. Holliday
    • Phonetics and Speech Sciences
    • /
    • v.15 no.3
    • /
    • pp.45-52
    • /
    • 2023
  • Previous studies have established a role for cognitive differences in explaining variability in speech processing across individuals. In the case of perceptual cue weighting in the context of a sound change, studies have produced conflicting results regarding the relationship between executive function and the use of redundant cues. The current study aimed to explore this relationship in acoustic cue weighting during speech production. Forty-one Korean-speaking children read a list of stop-initial words and completed two tests that assess executive function, i.e., Dimensional Change Card Sorting (DCCS) and digit n-back. Voice onset time (VOT) and fundamental frequency (F0) were measured in each word, and analyses were carried out to determine the extent to which children's executive function predicted their use of both informative and less informative cues to the three pairs comprising the Korean three-way stop laryngeal contrast. No evidence was found for a relationship between cognitive ability and acoustic cue weighting in production, which is at odds with previous, albeit conflicting, results for speech perception. While this result may be due to the lack of task demands in the production task used here, it nevertheless expands the empirical ground upon which future work in this area may proceed.

Practical Biasing Power Analysis breaking Side Channel Attack Countermeasures based on Masking-Shuffling techniques (마스킹-셔플링 부채널 대응법을 해독하는 실용적인 편중전력분석)

  • Cho, Jong-Won;Han, Dong-Guk
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.9
    • /
    • pp.55-64
    • /
    • 2012
  • Until now, Side Channel Attack has been known to be effective to crack decrypt key such as smart cards, electronic passports and e-ID card based on Chip. Combination of Masking and shuffling methods have been proposed practical countermeasure. Newly, S.Tillich suggests biased-mask using template attack(TA) to attack AES with masking and shuffling. However, an additional assumption that is acquired template information previously for masking value is necessary in order to apply this method. Moreover, this method needs to know exact time position of the target masking value for higher probability of success. In this paper, we suggest new practical method called Biasing Power Analysis(BPA) to find a secret key of AES based on masking-shuffling method. In BPA, we don't use time position and template information from masking value. Actually, we do experimental works of BPA attack to 128bit secret key of AES based on masking-shuffling method performed MSP430 Chip and we succeed in finding whole secret key. The results of this study will be utilized for next-generation ID cards to verify physical safety.

A Threats Statement Generation Method for Security Environment of Protection Profile (PP의 보안환경을 위한 위협문장 생성방법)

  • 고정호;이강수
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.3
    • /
    • pp.69-86
    • /
    • 2003
  • A Protection Profile(PP) is a common security and assurance requirements for a specific class of Information Technology security products such as firewall and smart card. A PP should be included "TOE(Target of Evaluation) Security Environment", which is consisted of subsections: assumptions, treat, organizational security policies. This paper presents a new threats statement generation method for developing TOE security environment section of PP. Our survey guides the statement of threats in CC(Common Criteria) scheme through collected and analysed hundred of threat statements from certified and published real PPs and CC Tool Box/PKB that is included a class of pre-defined threat and attack statements. From the result of the survey, we present a new asset classification method and propose a threats statement generation model. The former is a new asset classification method, and the later is a production rule for a well formed statement of threats.

  • PDF

A System for Improving Fairness of Online Test Using Camera (카메라를 이용한 온라인 시험 공정성 강화 시스템)

  • Ko, Joo-Young;Shim, Jae-Chang;Kim, Hyen-Ki
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.10
    • /
    • pp.1427-1435
    • /
    • 2009
  • E-Learning is different from the traditional classroom learning and examinees can take a class individually anywhere by online. And it is difficult to proctor an examination because they also take a test by online. However the results of the online test are included in their examination scores. Therefore, it is very important to authenticate the examinees. In this paper, we propose improvement of fairness system for online test using camera. Students can take a picture after every online classes and it has been saved. And during the test, ELTS(e-Learning Test System) takes images, detects the faces, and protects from getting another person to sit for cheating. After examination, the images have been transferred with the answer sheets to the cyber school management system. And a report card will be printed out with the user's images. Moreover, it will authenticate oneself and protect the online test from cheating.

  • PDF

A Literature Study on Digital Currency and Historical Developments of Money: Dynamic Pattern in Currency, Central Bank Digital Currency and Libra (디지털화폐와 화폐 변천과정에 관한 문헌적 연구: 동적패턴, CBDC, 리브라를 중심으로)

  • Kim, Euiseok
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.2
    • /
    • pp.109-126
    • /
    • 2020
  • This study attempts to find out the characteristics of digital currency and currency transformation through the analytical descriptions of the literature. In the early days of the emergence of new currency, market-oriented autonomous monetary adjustment was made along with various attempts by the private sector, and then government-centered central currency management and coordination were made for the national monopoly of profits and power. Digital currency can be seen as the emergence of a new form of money that will bring about paradigm changes. CBDC can be divided into direct and indirect types. CBDC is expected to require a strategic approach by the government or firm as it will bring about changes in the ecosystem of related industries. Libra is a stablecoin designed to minimize price fluctuations, and if it succeeds in commercializing it, it is expected to bring about revolutionary changes in the financial industry around the world.

A Study on Security Capability of IDPS (침입 탐지 및 차단 시스템의 보안능력에 관한 연구)

  • Woo, Sung-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.9-15
    • /
    • 2012
  • With the rise of internet and e-commerce, this is more applicable now than ever. People rely on computer networks to provide them with news, stock prices, e-mail and online shopping. People's credit card details, medical records and other personal information are stored on computer systems. Many companies have a web presence as an essential part of their business. The research community uses computer systems to undertake research and to disseminate findings. The integrity and availability of all these systems have to be protected against a number of threats. Amateur hackers, rival corporations, terrorists and even foreign governments have the motive and capability to carry out sophisticated attacks against computer systems. Therefore, the field of information and communication security has become vitally important to the safety and economic well being of society as a whole. This paper provides an overview of IDS and IPS, their functions, detection and analysis techniques. It also presents comparison of security capability and characteristics of IDPS techniques. This will make basis of IDPS(Intrusion Detection and Protection System) technology integration for a broad-based IDPS solutions

The Experiment of Flow Induced Vibration in PWR RCCAs

  • Kim, Sang-Nyung;Cheol Shin
    • Journal of Mechanical Science and Technology
    • /
    • v.15 no.3
    • /
    • pp.291-299
    • /
    • 2001
  • Recently, severe wear on the shutdown rod cladding of Ulchin Nuclear Power Plant #1, #2 were observed by the Eddy Current Test(E.C.T.). In particular, the wear at the sixth card location was up to 75%. The test results indicated that the Flow Induced Vibration(F.I.V.) might be the cause of the fretting wear resulting from the contact between Rod Cluster Control Assemblies(RCCAs) and their spacing cards(guide plates) arranged in the guide tube. From reviewing RCCAs fretting wear repots and analyzing the general characteristics of F.I.V. mechanism in the reactor, geometric layout and flow conditions around the control rod, it is concluded that the turbulence excitation is the most probable vibration mechanism of RCCA. To identify the governing mechanism of RCCA vibration, an experiment was performed for a representative rod position in which the most serious fretting wear experienced among the six rod positions. The experimental rig was designed and set up to satisfy the governing nondimensional numbers which are Reynolds number and mass damping parameter. The vibration amplitude measurement by the non-contact laser displacement sensor showed good agreements in the frequency and the maximum wearing(vibration) location with Ulchin E.C.T. results and Framatome report, respectively. The sudden increase in the vibration amplitude was sensed around the 6th guide plate with mass flow rate variation. Comparing the similitude rod behaviour with the idealized response of a cylinder in flow induced vibration, it was found that he dominant mechanism of vibration was transferred from turbulence excitation to periodic shedding at the mass flow ate 90ι/min. Also the critical velocity of the vibration in RCCAs was determined and the vibration can be prevented by reducing the bypass flow rate below the critical velocity.

  • PDF

A Design of Protocol Based on Smartcard for Financial Information to Protect in E-payment System (온라인 소액결제 시스템에서 금융정보 보호를 위한 스마트카드 기반의 프로토콜 설계)

  • Lee, Kwang-Hyoung;Park, Jeong-Hyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.11
    • /
    • pp.5872-5878
    • /
    • 2013
  • This study provides two channel structure and two factor authentication. First, a purchasing request by Internet and then user certification and a settlement approval process by mobile communication. Second, it support that proposal protocol utilize a partial factor value of stored in users smartcard, smart phone and password of certificate. Third, storage stability is improved because certificate store in smartcard. Finally, proposal protocol satisfy confidentiality, integrity, authentication, and non- repudiation on required E-commerce guideline. In comparative analysis, Efficiency of the proposal protocol with the existing system was not significantly different. But, In terms of safety for a variety of threats to prove more secure than the existing system was confirmed.