• Title/Summary/Keyword: home security

Search Result 733, Processing Time 0.026 seconds

The condition and the analysis of the problems of the Japanese - The change of the Korean geriatric security law - (일본 유료 노인홈의 현황과 그 문제점 분석 - 우리나라 노인 복지법 개정에 즈음하여 -)

  • 신경주
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 1993.09a
    • /
    • pp.13-20
    • /
    • 1993
  • In Korea, the elderly support has been accomplished by the families in the extended family system with the influence of the transmigration and the confucianism thought. But in Korea the drastic changes of society such as, the growth of the elderly pollution, the urbanization, the decrease of the birth rate, the increase of the working women, the growth of the nuclear families, etc., make the family difficult to take care of the elderly. Therefore, some people insist on the construction of the elderly home as the way to solve the elderly problems and some of corporations including profit-organizations are ready to participate the construction of the elderly home. They force the change of the current social security law because it is impossible to carry out the plans uncer the law. At this point, the conditions of the elderly home in Japan which is geographically close to Korea and has facillicated the elderly home business were examined at the consumer perspectives. The purpose of this study were to consider the possible problems in the elderly home and to prevent from happening another elderly problems in the future.

  • PDF

Reliability of the Ubiquitous Home-Based Simulator Developed for the Eerror Control (유비쿼터스 홈 기반의 신뢰성 제공을 위한 오류 제어 시뮬레이터 개발)

  • Lee, Si-Heung;Kim, Hong-Yoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.12
    • /
    • pp.5885-5894
    • /
    • 2011
  • Ubiquitous environment is expected to be result of researches and studies in ubiquitous home base on. However, because of the complexity of the ubiquitous home base on, the realization of error handling seems impossible. In this paper, we present how to detect and recover from these errors for the Ubiquitous Home utilizing a fault simulator developed for the study and through a variety of experiments, results were discussed and analyzed. Base on the said results, future works are also discussed.

A Survey on Detecting Interactions among Different Devices/Apps in IoT (IoT 분야의 다양한 기기/앱 간 상호작용 검출에 관한 연구동향)

  • Yicheng Zhen;Yeonjoon Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.101-103
    • /
    • 2023
  • With the recent advances in communication technology and Internet of Things (IoT) infrastructure, home automation systems have emerged as a new paradigm for providing users with convenient smart home services. The IoT ecosystem has merged digital systems with the physical world, dramatically changing the way people live and work. However, at the same time, security remains one of the most significant research issues in IoT, as the deployment and application of high-availability systems come with various security risks that cause serious threats to users. Among them, the security issues arising from the interaction among devices/applications should not be underestimated. Attackers can exploit interactions among devices/applications to hack into the user's home. In this paper, we present a survey of research on detecting various types of interactions among devices/applications in IoT.

Causal model of Urban Households' Subjective Financial Security (체계론에 근거한 주관적 재정안정도에 대한 인과적 모형)

  • 김연정
    • Journal of the Korean Home Economics Association
    • /
    • v.29 no.4
    • /
    • pp.151-165
    • /
    • 1991
  • The purpose of this study was to examine causal model of resources and demands, family financial management and subjective financial security among urban households based on system theory. For this purpose, the data were collected by the questionnaire sheets. 455 housewives participated this survey in Seoul. And the data were analyzed by various statistical methods such as Frequency, Percentile, ANOVA, F-test, Pearson's correlation analysis, Multipe Regression Analysis, and Path Analysis. The results of this research were as follows: 1. There were significant differences in the Subjective Financial Security according to resource variables and demand yariables. Those variables were such as housewive's age, education, occupation, househead's occupation, per capita income, aspiration, expectancy, perception of financial progress and relative deprivation. 2. The higher family financial management level, the higher level of Subjective Financial security. And the higher family financial management plan·implement level, the higher level of Subjective Financial security. 3. The lower debt/asset ratio, the higher level of Subjective Financial security. 4. Aspiration, per capita income an financial managemant variables showed direct effect on Subjective Financial security among all variables affecting the urban households' Subjective financial security. While housewive's education level, aspiration, per capita income and husband's occupation affected indirectly on the Subjective Financial security through family financial managemant.

  • PDF

Perception of Family Security and Satisfaction of Family Life : By the type of Self-Support of Newly Married Household (도시신혼기가계의 가정경제안정도인지와 가정생활만족도 -가정경제 자립유형을 중심으로-)

  • 임정빈
    • Journal of the Korean Home Economics Association
    • /
    • v.33 no.2
    • /
    • pp.1-18
    • /
    • 1995
  • The purpose of the study was to examine the type of self supporting economically, and the relation with the type of self-supporting, perception of family financial security and satisfaction of family life. The data was collected from newly married housewives and major findings are as follow: 1. The type of self-support was about 50% of subjectives, the housewives of this type relatively older, higher income, and they are lower in intimacy with husband's family, perception of financial security and satisfaction of family life. 2. The type of support was 30% of them, they are relatively older, higher educated, and higher income level. They are medium in intimacy with husband's family, and satisfaction of family life, but they percept financial security very highly 3. The type of dependence was relatively younger, very high educated. they are closed with husband's family, satisfied with family life, but not in perception of financial security.

  • PDF

The Relationship between Mothers' Parenting Behavior and Prcschoolers' Attachmcnt Security and Social Compctence. (어머니의 양육행동과 유아의 애착 및 사회적 능력과의 관계)

  • 박응임
    • Journal of the Korean Home Economics Association
    • /
    • v.36 no.3
    • /
    • pp.117-130
    • /
    • 1998
  • The purpose of this study was to investigate the relationship between mothers' parenting behavior and preschoolers' attachment security to their mother and preschoolers' social competence. The sample were 44 mothers and their 49-56 months old preschoolers. The instruments for this study were the modified IPBI(Iowa Parent Behavior Inventory: Mother Form), the Attachment Q-set by Waters and the modified ISCS(Iowa Social Competence Scales: Preschool Form). The data were analyzed by frequency, t-test, Pearson's r, and Multiple Regression Analysis. Major findings were that the responsive maternal parenting behavior was positively related to the preschoolers' attachment security. The guidance of maternal parenting behavior was positively related preschoolers' social activator of social competence. And there were significant correlations between the preschoolers' attachment security and social competence. The attachment security was positively related to the socially activating and cooperative competence.

  • PDF

Token-Based User Dynamic Access Control for Secure Device Commands in Smart Home (스마트 홈에서 안전한 디바이스 제어 명령을 위한 토큰 기반 사용자 동적 접근제어 기법)

  • Hyeseon Yu;Minhye Seo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.553-568
    • /
    • 2024
  • Due to the rapid development of IoT technology and the increase in home activities after the COVID-19 pandemic, users' demand for smart homes has increased significantly. As the size of the smart home market increases every year and the number of users increases, the importance of personal information protection and various security issues is also growing. It often grants temporary users smart home owner rights and gives them access to the system. However, this can easily allow access to third parties because the authorities granted are not properly managed. In addition, it is necessary to prevent the possibility of secondary damage using personal information collected through smart home devices and sensors. Therefore, in this paper, to prevent indiscriminate access to smart home systems without reducing user convenience, access rights are subdivided and designed according to the functions and types of smart home devices, and a token-based user access control technique using personal devices is proposed.

Research of Home Application Model for Implementation of Home Automation Server

  • Kim, Yu-Chul;Kim, Hyo-Sup;Lee, Guhn-Song;Cho, Young-Jo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.70.2-70
    • /
    • 2001
  • This paper presents an application model for home automation control. In this work, we propose home application scenarios that are suitable for the home life style and design a control structure integrating various home automation functions, such as lightning, heating, cooling, security, fire protection, telemetering, entertainment and communication. State-of-the-art wired/wireless home networks such as Bluetooth, LonWorks, IEEE1394 and PLC(Power Line Communication) are included in the control structure.

  • PDF

Analysis of Jini 2.0 Security for Home Network (홈네트워크를 위한 Jini 2.0 Security 분석)

  • 이윤경;한종욱;김도우;주홍일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.717-720
    • /
    • 2004
  • Jini is a middle ware supposed in Sun Microsystems. The goal of lil is the establishment of dynamic distributed system, which can share information and control of other Jini technology-enabled services or devices in the same Jini system. Jini is one of the best middleware together UPnP and HAVi. Hone network security, soch as privacy protection, crime prevention, and etc, is very important. So Jini 2.0 adds security mechanism in 11. 2003. This paper describes the analysis of Jini 2.0 security mechanism, and home network security.

  • PDF

Attribute-base Authenticated Key Agreement Protocol over Home Network (홈네트워크 상에서 속성기반의 인증된 키교환 프로토콜)

  • Lee, Won-Jin;Jeon, Il-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.49-57
    • /
    • 2008
  • User authentication and key agreement are very important components to provide secure home network service. Although the TTA adopted the EEAP-PW protocol as a user authentication and key transmission standard, it has some problems including not to provide forward secrecy. This paper first provides an analysis of the problems in EEAP-PW and then proposes a new attribute-based authenticated key agreement protocol, denoted by EEAP-AK. to solve the problems. The proposed protocol supports the different level of security by diversifying network accessibility for the user attribute after the user attribute-based authentication and key agreement protocol steps. It efficiently solves the security problems in the EEAP-PW and we could support more secure home network service than the EEAP-AK.