• Title/Summary/Keyword: illegal behavior

Search Result 94, Processing Time 0.043 seconds

Effect of Individual Breeding and Feeding on the Growth of Juvenile Mauremys reevesii (개별 사육 및 먹이 급여가 멸종위기종 남생이 유체 성장에 미치는 영향)

  • Koo, Kyo Soung;Song, Jae Young
    • Korean Journal of Ecology and Environment
    • /
    • v.51 no.2
    • /
    • pp.168-173
    • /
    • 2018
  • Mauremys reevesii is a Korean endemic turtle, and designed as an endangered species and national monument in South Korea. Recently, the population of the species has been dramatically declining because of habitat destruction, pollution and illegal capture. Moreover, small population size, difficulty of securing individuals, and lack of research are factors that impede the effective management of the species. In this study, we tested the effect of individual breeding and feeding on the seven juveniles of M. reevesii. Our results showed individual breeding and feeding were guaranteed the effective growth and development. Noticeable growth was confirmed in both body weight and carapace length. Moreover, the size difference among the individuals appeared at the start of this study decreased at the end of this study. Artificial breeding during the wither season was not caused disorders on the growth, behavior and morphology. This individual breeding may lead to effective growth and development, and it will be a way to increase the survival rate when the juveniles released into the wild.

Game Bot Detection Based on Action Time Interval (행위 시간 간격 기반 게임 봇 탐지 기법)

  • Kang, Yong Goo;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1153-1160
    • /
    • 2018
  • As the number of online game users increases and the market size grows, various kinds of cheating are occurring. Game bots are a typical illegal program that ensures playtime and facilitates account leveling and acquisition of various goods. In this study, we propose a method to detect game bots based on user action time interval (ATI). This technique observes the behavior of the bot in the game and selects the most frequent actions. We distinguish between normal users and game bots by applying Machine Learning to feature frequency, ATI average, and ATI standard deviation for each selected action. In order to verify the effectiveness of the proposed technique, we measured the performance using the actual log of the 'Aion' game and showed an accuracy of 97%. This method can be applied to various games because it can utilize all actions of users as well as character movements and social actions.

College Students' Consumer Non-ethics and Related Factors (대학생의 소리자 비윤리 지각과 행동 및 관련 변수 -김해시 대학생소비자를 중심으로-)

  • Jae, Mie-Kyung;Seo, Jeong-Hee;Kim, Young-Ok
    • Korean Journal of Human Ecology
    • /
    • v.13 no.6
    • /
    • pp.891-901
    • /
    • 2004
  • This study is to investigate the degree of consumers' non-ethical perceptions and behaviors, and to explore related variables such as demographic variables, idealism and relativism. The data used in this study were obtained by surveying 237 college students from 10th through 24th of October, 2002 in Kimhae city. We conducted a statistical analysis of the data, using percentiles, frequencies, means, t-test, ANOVA, and Multiple Regression. Consumers' non-ethical perceptions and behaviors were measured by modifying Consumer Ethics Scale(CES, Muncy & Vitell, 1992). The CES scale comprises 4 sub-factors: actively benefiting from illegal activity(CES1), passively benefiting(CES2), actively benefiting from questionable action(CES3), no harm/no foul(CES4). Average scores of consumers' non-ethical perceptions and behaviors marked below a mid-value, which means that most of the students are basically ethical. The related variable of consumers' non-ethical perceptions was idealism. The related variables of consumers' non-ethical behaviors were idealism and the amount of discretionary money. The results show that most of the participants are basically ethical as a consumer. However, the results related with the CES4 sub-factor which includes consumer attitudes toward copyrights of consumer softwares and music CDs tell us that they are relatively non-ethical. This claims an importance of consumer education to college students in regards to intellectual property.

  • PDF

A Virtualization Management Convergence Access Control Model for Cloud Computing Environments (클라우드 컴퓨팅 환경에서 가상화 관리 융합접근제어 모델)

  • Choi, Eun-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.69-75
    • /
    • 2018
  • The purpose of access control is to prevent computing resources from illegal behavior such as leakage, modification, and destruction by unauthorized users. As the cloud computing environment is expanded to resource sharing services using virtualization technology, a new security model and access control technique are required to provide dynamic and secure cloud-based computing services. The virtualization management convergence access control model provides a flexible user authorization function by applying the dynamic privilege assignment function to the role based access control mechanism. In addition, by applying access control mechanism based on security level and rules, we solve the conflict problem in virtual machine system and guarantee the safeness of physical resources. This model will help to build a secure and efficient cloud-based virtualization management system and will be expanded to a mechanism that reflects the multi-level characteristics.

Structural Analysis on the Path of Problem Gambling among College Students - Using Jacob's General Theory of Addiction- (대학생의 문제도박 발달경로 구조분석 -Jacob의 중독의 일반이론 적용-)

  • Jang, Soomi
    • Korean Journal of Social Welfare
    • /
    • v.65 no.2
    • /
    • pp.231-254
    • /
    • 2013
  • The growth of legal and illegal gambling industry in Korea has increased the gambling accessibility. Actually, the prevalence of gambling addiction in Korea is significantly higher than those in western countries. The problems related to gambling make negative consequences in the individual, familial and socio-economical aspect. Previous studies showed that the prevalence of problem gambling by college students was much higher than that by adolescence and adult due to the nature of psychosocial developmental stage. The purpose of this study is to explore the path of problem gambling among college students based on the Jacob's general theory of addiction. Participants are 366 male college students who have experienced on gambling behavior. The main results are as follows. First, the problem gambling prevalence of participants is 14%. Second, statistical analysis using structural equation modeling shows the significant pathway among psychological vulnerability, needs to escape and problem gambling. Instead, the physiological vulnerability is not significant on the path to problem gambling. On the basis of these findings, the implications for social welfare prevention and intervention to college students are discussed.

  • PDF

Mathematical Modelling and Chaotic Behavior Analysis of Cyber Addiction (사이버 중독의 수학적 모델링과 비선형 거동 해석)

  • Kim, Myung-Mi;Bae, Young-Chul
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.3
    • /
    • pp.245-250
    • /
    • 2014
  • Addiction can be largely divided into two categories. One is called medium addiction in which medium itself causes an addiction. Another is called cause addiction that brings addiction through combination of sensitive self and latent personal action. The medium addiction involves addiction phenomena directly caused by illegal drugs, alcohol and various other chemicals. The cause addiction is dependent on personal sensitivities as a sensitive problem of personal and includes cyber addictions such as shopping, work, game, internet, TV, and gambling. In this paper we propose two-dimensional addiction model that are equivalent to using an R-L-C series circuit of Electrical circuit and a Spring-Damper-mass of mechanical system. We also organize a Duffing equation that is added a nonlinear term in the proposed two-dimensional addiction model. We represent periodic motion and chaotic motion as time series and phase portrait according to parameter's variation. We confirm that among parameters chaotic motion had addicted state and periodic motion caused by change in control coefficient had pre-addiction state.

Collaboration Model Design to Improve Malicious Node Detection Rate in MANET (MANET에서 악의적 노드 탐지율 향상을 위한 협업모델 설계)

  • Shin, Eon-Seok;Jeon, Seo-In;Park, Gun-Woo;Ryu, Keun-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.3
    • /
    • pp.35-45
    • /
    • 2013
  • MANET has a weak point because it allows access from not only legal nodes but also illegal nodes. Most of the MANET researches had been focused on attack on routing path or packet forwarding. Nevertheless, there are insuffcient studies on a comprehensive approach to detect various attacks on malicious nodes at packet forwarding processes. In this paper, we propose a technique, named DTecBC (detection technique of malicious node behaviors based on collaboration), which can handle more effciently various types of malicious node attacks on MANET environment. The DTecBC is designed to detect malicious nodes by communication between neighboring nodes, and manage malicious nodes using a maintain table. OPNET tool was used to compare with Watchdog, CONFIDANT, SRRPPnT for verifying effectiveness of our approach. As a result, DTecBC detects various behaviors of malicious nodes more effectively than other techniques.

Camera Model Identification Based on Deep Learning (딥러닝 기반 카메라 모델 판별)

  • Lee, Soo Hyeon;Kim, Dong Hyun;Lee, Hae-Yeoun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.10
    • /
    • pp.411-420
    • /
    • 2019
  • Camera model identification has been a subject of steady study in the field of digital forensics. Among the increasingly sophisticated crimes, crimes such as illegal filming are taking up a high number of crimes because they are hard to detect as cameras become smaller. Therefore, technology that can specify which camera a particular image was taken on could be used as evidence to prove a criminal's suspicion when a criminal denies his or her criminal behavior. This paper proposes a deep learning model to identify the camera model used to acquire the image. The proposed model consists of four convolution layers and two fully connection layers, and a high pass filter is used as a filter for data pre-processing. To verify the performance of the proposed model, Dresden Image Database was used and the dataset was generated by applying the sequential partition method. To show the performance of the proposed model, it is compared with existing studies using 3 layers model or model with GLCM. The proposed model achieves 98% accuracy which is similar to that of the latest technology.

System Specification-based Design of Mobile Alarm System for Privacy Protection (시스템 명세화 기법 기반의 개인정보보호 모바일 알람 시스템 설계 및 구현)

  • Jang, Eun-Young;Kim, Hyung-Jong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.113-121
    • /
    • 2010
  • The system specification is a system theory based formal representation method for systems' structure and behavior modeling. When we make use of the system specification method in each step of software development, we can derive a hierarchical and modularized system design which enables us to manage the software development process flexibly. This research presents system specification based design of a mobile alarm system which sends alerts about illegal usage of private information and manages the response against the each alert. In our design of mobile alarm system, there are formal definition of alert message overcoming the functional limitation of mobile device and hierarchical modularized modeling of alarm processing using system specification. The efficiency of making use of the system specification is shown by applying the specification method to implementation of mobile alarm system. The contribution of this work is in design and implementation of mobile alarm system which enables us to handle the private information leakage situation more flexible way using system specification based software designing method.

Common People's Emotional Response and Attitude toward Law in Korean Society (한국인의 법의식: 법리(法理)와 정리(情理)의 갈등)

  • Si-Up Kim;Ji-Young Kim
    • Korean Journal of Culture and Social Issue
    • /
    • v.9 no.1
    • /
    • pp.67-79
    • /
    • 2003
  • Why, in general, don't Korean people follow the law? Possible one of the answers to this question is based on lay people's emotional evaluation to the law in which common people's evaluation to the guilty according to their private logics comparing to public logics of facts and sentence of illegal behavior. Futhermore, in psychological field, there have been some researches concerning on differences in morality such as moral judgement and evaluation including moral inference among cultures. Therefore, the reason why Korean people tend to be not law observance and law break is that Korean people are not immoral such as telling a lie and not keeping promises, but rather they have a tendency of appling their private and personal logics based on Cheong(interpersonal affection) relationships and logics to public and legal affairs.

  • PDF