• Title/Summary/Keyword: information access

Search Result 10,262, Processing Time 0.038 seconds

Study on security requirements for the web based operation system of a shipping company (웹 기반 해운 선사 운영시스템 보안 요구사항 연구)

  • Chung, Up;Moon, Jongsub
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.49-68
    • /
    • 2022
  • The operation system of a shipping company is still maintaining the mainframe based terminal access environment or the client/server based environment. Nowadays shipping companies that try to migrate it into a web-based environment are increasing. However, in the transition, if the design is processed by the old configuration and knowledge without considering the characteristics of the web-based environment and shipping business, various security vulnerabilities will be revealed at the actual system operation stage, and system maintenance costs to fix them will increase significantly. Therefore, in the transition to a web-based environment, a security design must be carried out from the design stage to ensure system safety and to reduce security-related maintenance costs in the future. This paper examines the characteristics of various threat modeling techniques, selects suitable modeling technique for the operation system of a shipping company, applies data flow diagram and STRIDE threat modeling technique to shipping business, derives possible security threats from each component of the data flow diagram in the attacker's point of view, validates the derived threats by mapping them with attack library items, represents the attack tree having various attack scenarios that attackers can attempt to achieve their final goals, organizes into the checklist that has security check items, associated threats and security requirements, and finally presents 23 security requirements that can respond to threats. Unlike the existing general security requirements, the security requirements presented in this paper reflect the characteristics of shipping business because they are derived by analyzing the actual business of a shipping company and applying threat modeling technique. Therefore, I think that the presented security requirements will be of great help in the security design of shipping companies that are trying to proceed with the transition to a web-based environment in the future.

The study of consumer types according to the level of digital divide (디지털 정보격차 수준에 따른 소비자유형 연구)

  • Baek, Ji-Yeon;Jang, Eun-Gyo;Lee, Jin-Myong
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.193-202
    • /
    • 2022
  • The purpose of this study is to propose an effective informatization policy by categorizing consumer groups according to the level of digital divide and identifying the characteristics of each type. For this end, a total of 402 data were collected through an online and on-site surveys targeting consumers with internet experience, and the data were analyzed using the SPSS 26.0 program. As a result of conducting a K-means cluster analysis based on access to, capability, and utilization of digital devices, four consumer groups were categorized: 'device lover', 'proficient user', 'general user', and 'digital alienated'. By consumer type, significant differences were found in demographic characteristics, social capital, perception of the future information society, attitude toward technology as innovativeness, discomfort and familiarity, which are the antecedent variables of the digital divide. Significant differences in digital device satisfaction and intention to use, which are outcome variables of the digital divide, were also confirmed by consumer type. This study is academically and practically valuable in that it proposes customized informatization policies for each consumer group according to the level of digitization.

A Fog-based IoT Service Interoperability System using Blockchain in Cloud Environment (클라우드 환경에서 블록체인을 이용한 포그 기반 IoT 서비스 상호운용 시스템)

  • Kim, Mi Sun;Park, Yong Suk;Seo, Jae Hyun
    • Smart Media Journal
    • /
    • v.11 no.3
    • /
    • pp.39-53
    • /
    • 2022
  • Cloud of Things (CoT) can provide IoT applications with unlimited storage functions and processing power supported by cloud services. However, in a centralized cloud of things, it can create a single point of failure that can lead to bottleneck problems, outages of the CoT network. In this paper, to solve the problem of centralized cloud of things and interoperate between different service domains, we propose an IoT service interoperability system using distributed fog computing and blockchain technology. Distributed fog is used to provide real-time data processing and services in fog systems located at a geographically close distance to IoT devices, and to enable service interoperability between each fog using smart contracts and distributed ledgers of the blockchain. The proposed system provides services within a region close to the distributed fog entrusted with the service from the cloud, and it is possible to access the services of other fogs without going through the cloud even between fogs. In addition, by sharing a service right token issuance information between the cloud and fog nodes using a blockchain network, the integrity of the token can be guaranteed and reliable service interoperability between fog nodes can be performed.

The Effects of Self-esteem, Shopping Motivations, and Shopping Tendencies on the Clothing Purchase Behavior of the MZ Generation (MZ세대의 자아존중감, 쇼핑동기 및 쇼핑성향이 의복구매행동에 미치는 영향)

  • Lee, Myeong-Jin;Lee, Min-Ji;Kim, Hye-Kyung
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.308-321
    • /
    • 2022
  • The purpose of this study is to understand how self-esteem, shopping motivations, and shopping tendencies affect the clothing purchase behavior of the so-called "MZ generation," a cohort that includes both millenials and Generation Z and exerts significant influence in various areas. The results of this study can be summarized as follows: First, it was found that extrinsic purchase motivations (purchased made due to the influence of other people), trend-seeking shopping tendencies, and pleasure-seeking shopping tendencies had a positive and significant effect on personal needs among the sub-factors of clothing purchase behavior of the MZ generation. Second, it was found that the MZ real purchase shopping motivations, trend-seeking shopping tendencies, pleasure-seeking shopping tendencies, and convenience-seeking shopping tendencies had a positive and significant effect on actual needs among the sub-factors of clothing purchase behavior among the MZ generation. Third, it was found that social self-esteem, extrinsic purchase motivations, and convenience-seeking shopping tendencies had a positive and significant effect on clothing marketing strategies among the sub-factors of clothing purchase behavior of the MZ generation. On the other hand, personal self-esteem was found to negatively affect the marketing strategies of clothing purchase behavior. In other words, the expectation that the MZ generation would buy clothes in accordance with their individual preferences and beliefs was not supported by the findings of this study. It would appear that the beliefs and behaviors of the digitally savvy MZ generation are changed by the fashion trend-related information they readily access when purchasing clothing. From the above research results, it can be concluded that there many variables that influence the clothing purchase behavior of the MZ generation and it is thus necessary to consider this cohort a new consumer segment and establish marketing strategies accordingly.

Explanable Artificial Intelligence Study based on Blockchain Using Point Cloud (포인트 클라우드를 이용한 블록체인 기반 설명 가능한 인공지능 연구)

  • Hong, Sunghyuck
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.8
    • /
    • pp.36-41
    • /
    • 2021
  • Although the technology for prediction or analysis using artificial intelligence is constantly developing, a black-box problem does not interpret the decision-making process. Therefore, the decision process of the AI model can not be interpreted from the user's point of view, which leads to unreliable results. We investigated the problems of artificial intelligence and explainable artificial intelligence using Blockchain to solve them. Data from the decision-making process of artificial intelligence models, which can be explained with Blockchain, are stored in Blockchain with time stamps, among other things. Blockchain provides anti-counterfeiting of the stored data, and due to the nature of Blockchain, it allows free access to data such as decision processes stored in blocks. The difficulty of creating explainable artificial intelligence models is a large part of the complexity of existing models. Therefore, using the point cloud to increase the efficiency of 3D data processing and the processing procedures will shorten the decision-making process to facilitate an explainable artificial intelligence model. To solve the oracle problem, which may lead to data falsification or corruption when storing data in the Blockchain, a blockchain artificial intelligence problem was solved by proposing a blockchain-based explainable artificial intelligence model that passes through an intermediary in the storage process.

Design of detection method for malicious URL based on Deep Neural Network (뉴럴네트워크 기반에 악성 URL 탐지방법 설계)

  • Kwon, Hyun;Park, Sangjun;Kim, Yongchul
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.5
    • /
    • pp.30-37
    • /
    • 2021
  • Various devices are connected to the Internet, and attacks using the Internet are occurring. Among such attacks, there are attacks that use malicious URLs to make users access to wrong phishing sites or distribute malicious viruses. Therefore, how to detect such malicious URL attacks is one of the important security issues. Among recent deep learning technologies, neural networks are showing good performance in image recognition, speech recognition, and pattern recognition. This neural network can be applied to research that analyzes and detects patterns of malicious URL characteristics. In this paper, performance analysis according to various parameters was performed on a method of detecting malicious URLs using neural networks. In this paper, malicious URL detection performance was analyzed while changing the activation function, learning rate, and neural network structure. The experimental data was crawled by Alexa top 1 million and Whois to build the data, and the machine learning library used TensorFlow. As a result of the experiment, when the number of layers is 4, the learning rate is 0.005, and the number of nodes in each layer is 100, the accuracy of 97.8% and the f1 score of 92.94% are obtained.

The Status of Mobility Disadvantaged Persons with Physical Disabilities & Suggested Improvements in Chungnam (충남지역 지체장애인의 이동권 실태 및 개선방안 연구)

  • Choi, Yun-Young;Yang, Jung-Bin;Kim, Ja-Young
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.4
    • /
    • pp.130-136
    • /
    • 2021
  • This study investigated the general characteristics of mobility disadvantaged persons with disabilities, and to suggest implications to ensure personal mobility with the greatest possible independence for the physically disabled in community. The survey questionnaire included the categories as follows: the general characteristics of the participants, the status of outing and mobility, usage of low-floor buses & taxi for the disabled, service improvement, and mobile support center. Data collected from 219 with physical disabilities were analyzed for this purpose by using descriptive statistics. The study results showed that 54.6% of the total tended to go out everyday, and 17.0% rarely. 53.4% could go out without any assistance, and the major obstacles not to go out were stairs and inconvenience of public transportation. 26.9% used low-floor buses, and 71.1% preferred to use taxi for the disabled. The average waiting time for the usage of low-flow buses and taxi was 66.57 minute and 42.65 minute, separately. 78.7% insisted that the function of mobile support center in the community should be expanded, whereas only 49.8% recognized the role of mobile support center. Based on the study results, the researchers suggested to facilitate access by persons with disabilities to mobility aids, and to improve the actual state of pedestrian environment. In addition, the function of mobile support center should be expanded to help the mobility disadvantaged persons live independently in community, thereby contributing to the promotion of their quality of life.

Preceding Research for Developing Floral Design Education Contents (화예디자인 교육 콘텐츠 개발을 위한 선행연구)

  • Hong, Yun Joo
    • Journal of the Korean Society of Floral Art and Design
    • /
    • no.42
    • /
    • pp.97-116
    • /
    • 2020
  • In this paper, the need for lifelong education and distance education is increasing due to the decrease of population and the increase of life expectancy. In addition, the popularization and everydayization of education, which combines daily life and learning, is an educational feature. Individuals can more easily access knowledge, and video plays an important role. Video content is the most basic medium that leads to the popularization and daily life of education. With the development of information and communication technology, popularization of media content production and editing technology, anyone can easily create and share. The video education contents business is expected to increase globally through SNS. Especially, the video contents education industry related to flower design is regarded as a suitable content field in an era where environment is essential. In the modern era, characterized by the "one-person household, one-person media" era, the environment of plants protects people from stress by restoring human emotional efficiency, environmental comfort, and stability. In other words, because humans have a preference for nature, plants play an important role for humanity recovery. Against this backdrop, flower design is expected to be a promising industrial sector with high growth, high value added and high job creation effects. In the era of the fourth revolution of the human race, competitive video contents are expected to influence the growth of the future country. will be.

A Study on the Influence on Psychological Characteristics and the Non-Access Value of Tourism Types of Jikji Cultural Assets (직지 문화재에 관한 관광 유형인 비이용가치와 심리적 특성에 관한 연구)

  • Lee, Ji-Hun
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.2
    • /
    • pp.155-164
    • /
    • 2020
  • This study identifies the relationship between selection value, existence value, heritage value, pride, and show on satisfaction, and suggests cultural marketing and cultural policy suggestions for Jikji cultural assets to activate Jikji as tourism cultural assets. Was intended. Therefore, the implications of this study are as follows. First, Jikji cultural property officials should develop tourism products that can mix Jikji cultural properties with the image and attractiveness of Jikji cultural properties. In addition, it is necessary to pay attention to education and public relations by city and county in providing local information, prices, and services for tourists to increase the satisfaction of tourists. Second, Jikji cultural property officials should suggest ways to create differentiating elements from tourism of other cultural properties. By emphasizing the existence, the existence value of Jikji cultural property should be increased. Third, Jikji cultural property officials should emphasize that Jikji tourism is more valuable as cultural heritage than now, and develop unique killer contents that can be boasted to others in tourism and present it to tourists. Fourth, Jikji cultural property officials should prepare a plan for local residents to recognize how excellent cultural heritage is. It should also be recognized that Jikji cultural property has high added value as a tourist factor. Lastly, Jikji cultural property officials should promote various jikji projects to local residents and tourists to increase their pride and awareness that Jikji cultural property exists in a certain area.

The Distribution of Pediatric Patients According to Accessibility to Dental Facilities in Pusan National University Dental Hospital (치과의료기관 접근성에 따른 부산대학교 치과병원 소아치과의 신환 분포)

  • Haena, Lee;Soyoung, Park;Jonghyun, Shin;Taesung, Jeong;Eungyung, Lee
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.49 no.4
    • /
    • pp.368-378
    • /
    • 2022
  • The purpose of this study was to analyze the accessibility to dental facilities and the differences in chief complaints of new patients who visited Pusan National University Dental Hospital. We collected information from electronic medical records for 1,820 new patients. The accessibility was analyzed by measuring the distance from the patient's house to the dental facilities. The distance was categorized into 10 km sections, and the presence or absence of a local pediatric dental clinic within 10 km of the patient's house was also categorized. As the distance between the house and Pusan National University Dental Hospital increased, the proportion of patients who visited for dental caries decreased, and orthodontic treatment increased. Dental caries accounts for 27.9% of less than 10 km and 20.5% over 30 km. Orthodontic treatment accounts for 25.4% within 10 km and 27.3% more than 30 km away. The presence or absence of a local pediatric dental clinic within 10 km did not significantly affect the distribution of chief complaints. This study can be used as basic research data to establish effective treatment measures that can improve the physical and geographical accessibility of patients visiting pediatric dentistry.