• Title/Summary/Keyword: illegal behavior

Search Result 94, Processing Time 0.024 seconds

Fault-Tolerant Control of Asynchronous Sequential Machines with Input Faults (고장 입력이 존재하는 비동기 순차 머신을 위한 내고장성 제어)

  • Yang, Jung-Min
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.7
    • /
    • pp.103-109
    • /
    • 2016
  • Corrective control for asynchronous sequential machines is a novel automatic control theory that compensates illegal behavior or adverse effects of faults in the operation of existent asynchronous machines. In this paper, we propose a scheme of diagnosing and tolerating faults occurring to input channels of corrective control systems. The corrective controller can detect faults occurring in the input channel to the controlled machine, whereas those faults happening in the external input channel cannot be detected. The proposed scheme involves an outer operator which, upon receiving the state feedback, diagnoses a fault and sends an appropriate command signal to the controller for tolerating faults in the external input channel.

U.S. Consumers' Motivations for Purchasing and Not Purchasing Fashion Counterfeit Goods

  • Kim, Hye-Jeong;Latour, Brittany N.
    • International Journal of Costume and Fashion
    • /
    • v.12 no.1
    • /
    • pp.11-27
    • /
    • 2012
  • This study explores U.S. consumers' perceptions about fashion counterfeit goods and counter feiting and motivations for purchasing and not purchasing those goods. A qualitative research technique utilizing self-administered essay questions was used to collect data. A convenience sample of female college students(N=128) drawn from classes at Midwestern and Southern universities in the U.S. participated in this study. This study found that a majority of consumers tended to perceive that fashion counterfeit goods are merely imitations of the legitimate goods and that counterfeiting is producing and selling fake goods, but a small number of consumers associated those goods with illegally produced goods and illegal practices or violations of intellectual property rights. The major motivations for purchasing counterfeit fashion goods were found to be price/value consciousness, appearance of counterfeit goods, status consumption, availability of the goods, desire for souvenirs, and social(family and peer) influences. In addition, the major deterrents to purchasing these goods were identified as integrity/ethical judgment, poor quality of counterfeit goods, self-image/status, and unavailability of the goods. This study provides policy makers and anti-counterfeit coalitions with information to develop effective educational programs or campaigns to influence consumers' counterfeit fashion purchasing behavior.

Implementation of Autonomous Intrusion Analysis Agent(AIAA) and Tool for using Intruder Retrace (인터넷 해킹피해 시스템자동분석에이젼트(AIAA) 및 침입자 역추적 지원도구 구현)

  • Im, Chae-Ho;Won, Yu-Heon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3410-3419
    • /
    • 1999
  • Autonomous Intrusion Analysis Agent(AIAA) is Incident Response Team staff's tool that scans, analyses, reports and alerts the traces of intrusion based on system logs and intruder's backdoors inside compromised system by IR staff after security incident is reported to the IR team. AIAA is intelligent to recognize to check out who is intruder from all the user accounts and to report the suspected candidates to the master control system in IR team. IR staff who controls AIAA with master system can pick up an intruder from the candidates reported by AIAA agent and review all related summary reports and details including source host's mane, finger information, all illegal behavior and so on. AIAA is moved to compromised system by the staff to investigate the signature of intrusion along the trace of victim hosts and it is also operated in secret mode to detect the further intrusion. AIAA is alive in all victim systems until the incident is closed and IR staff can control AIAA operation and dialogue with AIAA agent in Web interface.

  • PDF

MeBib Suppressed Methamphetamine Self-Administration Response via Inhibition of BDNF/ERK/CREB Signal Pathway in the Hippocampus

  • Kim, Buyun;Jha, Sonam;Seo, Ji Hae;Jeong, Chul-Ho;Lee, Sooyeun;Lee, Sangkil;Seo, Young Ho;Park, Byoungduck
    • Biomolecules & Therapeutics
    • /
    • v.28 no.6
    • /
    • pp.519-526
    • /
    • 2020
  • Methamphetamine (MA) is one of the most commonly abused drugs in the world by illegal drug users. Addiction to MA is a serious public health problem and effective therapies do not exist to date. It has also been reported that behavior induced by psychostimulants such as MA is related to histone deacetylase (HDAC). MeBib is an HDAC6 inhibitor derived from a benzimidazole scaffold. Many benzimidazole-containing compounds exhibit a wide range of pharmacological activity. In this study, we investigated whether HDAC6 inhibitor MeBib modulates the behavioral response in MA self-administered rats. Our results demonstrated that the number of active lever presses in MA self-administered rats was reduced by pretreatment with MeBib. In the hippocampus of rats, we also found MA administration promotes GluN2B, an NMDA receptor subunit, expression, which results in sequential activation of ERK/CREB/BDNF pathway, however, MeBib abrogated it. Collectively, we suggest that MeBib prevents the MA seeking response induced by MA administration and therefore, represents a potent candidate as an MA addiction inhibitor.

Problem Analysis to Secure Stability of Bitcoin (비트코인에 대한 안정성 확보를 위한 문제점 분석)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.1-9
    • /
    • 2017
  • Recently, Bitcoin which is digital currency and cryptocurrency is getting worldwide attention since Bitcoin has an ability to replace legal tender unlike other existing cyber currency. Especially, most Bitcoin trading is done between two traders such as P2P method and it does not require a third-party to make sure reliability and it records every transaction details, so it is more transparent then traditional financial trade, so the number of users is increasing. However, Bitcoin, which has been recognized for transparency, confidentiality and stability among traders has recently been threatened by illegal transactions such as money laundering and the attack on the exchange. These threats to Bitcoin are becoming social problems. At first, it seems that most of the digital currency is difficult to get hacked due to the Blockchain technology. However, threats such as digital money leaks by user account hacking and paralyzing the servers are increasing. In this paper, it will examine the features of the Bitcoin and the threatening elements to secure marketability of digital currency such as Bitcoin and receive more interest from public in domestic. The paper will examine the problems of Blockchain technology on speculative transactions and fraudulent behavior by analyzing the problems of Bitcoin transaction. Lastly, it will propose ways to make transparent and secure digital currency transactions.

A Study on Factors Influencing User's Security Behavioral Intention for Choosing Password (패스워드 선택을 위한 사용자의 보안행위의도에 영향을 미치는 요인)

  • Kim, Jong-Ki;Kang, Da-Yeon;Jeon, Jin-Hwan
    • The Journal of Information Systems
    • /
    • v.17 no.1
    • /
    • pp.23-43
    • /
    • 2008
  • Nowadays, openness and accessibility of information systems increase security threats from inside and outside of organization. Appropriate password is supposed to bring out security effects such as preventing misuses and banning illegal users. This study emphasizes on choosing passwords from perspective of information security and investigated user's security awareness affecting behavioral intention. The research model proposed in this study includes user's security belief which is influenced by risk awareness factors such as information assets, threats and vulnerability elements. The risk awareness factors ale derived from risk analysis methodologies for information security. User's risk awareness is a factor influencing the security belief, attitude toward security behavior, and security behavioral intention. According to the result of this study, while vulnerability is not related to the risk awareness, information assets and threats are related to the user's risk awareness. There is a significant relationship between risk awareness and security belief. Also, user's security behavioral intention is significantly affected by security attitude.

An Evaluation of Pedestrian Environments based on the Criteria of Universal Design Theory - A case study of old town area in Seoul - (서울시 유니버설디자인 보행환경 조성을 위한 보행환경 평가 연구 - 서울시 사대문안 사례를 중심으로 -)

  • Jeong, Sangyun;Sohn, Dong-Wook
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.1
    • /
    • pp.117-125
    • /
    • 2019
  • The purpose of this study is to examine urban built environments associated with the walking behavior in order to identify the problem of urban infrastructure from the perspective of Universal design theory. Using the walkability criteria developed based on the findings of previous studies on Universal design theory and walking environment, the urban built environments in old town area of Seoul were evaluated. The results of the evaluation indicated that the pedestrian infrastructure in the study area had several shortcomings to improve in order to provide walking-friendly environments. First, the pedestrian infrastructure for visually impaired people were severely limited. Second, walking traffics in large portion of the street networks were interrupted by a variety of obstacles such as parked cars, signboards, and illegal street shops. Third, there were certain areas where the quality of pavement was not properly managed. In summary, this study provides an empirical data to understand the current situation of pedestrian infrastructure in the urban areas. Improvement of pedestrian infrastructure is needed to address the issues related to the mobility of the disabled people. It is also recommended to construct the GIS data on walking environment in order to develop and mange a long-term public investment plan for walking-friendly urban environments.

The Effect of Fraud Pentagon Theory on Financial Statements: Empirical Evidence from Indonesia

  • DEVI, Putu Nirmala Chandra;WIDANAPUTRA, Anak Agung Gde Putu;BUDIASIH, I Gusti Ayu Nyoman;RASMINI, Ni Ketut
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.3
    • /
    • pp.1163-1169
    • /
    • 2021
  • This study aims to obtain empirical evidence regarding the effect of the fraud pentagon theory on financial statement fraud. The novelty of this study is the use of factor analysis to consolidate the five elements of the fraud pentagon into just one factor, which, to the knowledge of the researcher, no one else has done to research the effect of pentagon fraud on financial statement fraud. This study uses both agency theory and fraud pentagon theory. The population of this study consists of state-owned companies listed on the Indonesia Stock Exchange. The research period in this study is from 2014 to 2019. The data used in this study is secondary data obtained from the company's annual financial statements. A purposive sampling technique was used to determine the research sample. The selected companies total 20. Factor analysis and simple linear regression analysis method were used as research the methods. Based on the research results, it was found that the fraud pentagon theory had a positive effect on the financial statement fraud of state-owned companies listed on the Indonesia Stock Exchange. High level of the pentagon fraud on a company leads to a higher indication of financial statement fraud.

Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System

  • Zhang, Wei;Wu, Yi;Xiong, Hu;Qin, Zhiguang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.302-322
    • /
    • 2021
  • In the system of ciphertext policy attribute-based encryption (CP-ABE), only when the attributes of data user meets the access structure established by the encrypter, the data user can perform decryption operation. So CP-ABE has been widely used in personal health record system (PHR). However, the problem of key abuse consists in the CP-ABE system. The semi-trusted authority or the authorized user to access the system may disclose the key because of personal interests, resulting in illegal users accessing the system. Consequently, aiming at two kinds of existing key abuse problems: (1) semi-trusted authority redistributes keys to unauthorized users, (2) authorized users disclose keys to unauthorized users, we put forward a CP-ABE scheme that has authority accountability, user traceability and supports arbitrary monotonous access structures. Specifically, we employ an auditor to make a fair ruling on the malicious behavior of users. Besides, to solve the problem of user leaving from the system, we use an indirect revocation method based on trust tree to implement user revocation. Compared with other existing schemes, we found that our solution achieved user revocation at an acceptable time cost. In addition, our scheme is proved to be fully secure in the standard model.

Machine Learning-Based Reversible Chaotic Masking Method for User Privacy Protection in CCTV Environment

  • Jimin Ha;Jungho Kang;Jong Hyuk Park
    • Journal of Information Processing Systems
    • /
    • v.19 no.6
    • /
    • pp.767-777
    • /
    • 2023
  • In modern society, user privacy is emerging as an important issue as closed-circuit television (CCTV) systems increase rapidly in various public and private spaces. If CCTV cameras monitor sensitive areas or personal spaces, they can infringe on personal privacy. Someone's behavior patterns, sensitive information, residence, etc. can be exposed, and if the image data collected from CCTV is not properly protected, there can be a risk of data leakage by hackers or illegal accessors. This paper presents an innovative approach to "machine learning based reversible chaotic masking method for user privacy protection in CCTV environment." The proposed method was developed to protect an individual's identity within CCTV images while maintaining the usefulness of the data for surveillance and analysis purposes. This method utilizes a two-step process for user privacy. First, machine learning models are trained to accurately detect and locate human subjects within the CCTV frame. This model is designed to identify individuals accurately and robustly by leveraging state-of-the-art object detection techniques. When an individual is detected, reversible chaos masking technology is applied. This masking technique uses chaos maps to create complex patterns to hide individual facial features and identifiable characteristics. Above all, the generated mask can be reversibly applied and removed, allowing authorized users to access the original unmasking image.