• 제목/요약/키워드: information security system

Search Result 6,598, Processing Time 0.041 seconds

Development of a Portable Detection System for Simultaneous Measurements of Neutrons and Gamma Rays (중성자선과 감마선 동시측정이 가능한 휴대용 계측시스템 개발에 관한 연구)

  • Kim, Hui-Gyeong;Hong, Yong-Ho;Jung, Young-Seok;Kim, Jae-Hyun;Park, Sooyeun
    • Journal of radiological science and technology
    • /
    • v.43 no.6
    • /
    • pp.481-487
    • /
    • 2020
  • Radiation measurement technology has steadily improved and its usage is expanding in various industries such as nuclear medicine, security search, satellite, nondestructive testing, environmental industries and the domain of nuclear power plants (NPPs). Especially, the simultaneous measurements of gamma rays and neutrons can be even more critical for nuclear safety management of spent nuclear fuel and monitoring of the nuclear material. A semiconductor detector comprising cadmium, zinc, and tellurium (CZT) enables to detect gamma-rays due to the significant atomic weight of the elements via immediate neutron and gamma-ray detection. Semiconductor sensors might be used for nuclear safety management by monitoring nuclear materials and spent nuclear fuel with high spatial resolution as well as providing real-time measurements. We aim to introduce a portable nuclide-analysis device that enables the simultaneous measurements of neutrons and gamma rays using a CZT sensor. The detector has a high density and wide energy band gap, and thus exhibits highly sensitive physical characteristics and characteristics are required for performing neutron and gamma-ray detection. Portable nuclide-analysis device is used on NPP-decommissioning sites or the purpose of nuclear nonproliferation, it will rapidly detect the nuclear material and provide radioactive-material information. Eventually, portable nuclide-analysis device can reduce measurement time and economic costs by providing a basis for rational decision making.

A Study on Life and Health Status of Welfare Recipients after COVID-19: Focus on Group Differences by Gender, Living with Children and Household Type (코로나19 이후 복지대상자의 생활 및 건강에 대한 연구: 성별, 자녀유무, 가구형태에 따른 집단 간 차이를 중심으로)

  • Kim, HeeJoo;Jang, Yeon Jin
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.7
    • /
    • pp.384-394
    • /
    • 2022
  • This study aimed to examine how COVID-19 affected life and health of welfare recipients by comparing groups associated with sex, living with children, and household type and suggest directions for welfare policy and services. Researchers collected a random sample of 500 recipients from 𐩒𐩒gu, Seoul who are registered in Haengbok E-eum, the social security information system and conducted a survey on overall life domains and physical and mental health. For data analysis, t-test, Anova and chi-square test were used. The results showed that factors of sex, living with children, and household type made significant differences in difficulties of employment status, child care, leisure and cultural activities and overall social activities. In terms of health status, mental health status and life satisfaction have been decreased after COVID-19. There were statistical differences in COVID blue and thinking about death among different groups. Based on these findings, this study suggested directions for welfare services for the future New Normal society.

Designing a Longitudinal Database for Cohort Construction in Medical Education (의학교육의 코호트 구축을 위한 종단 데이터베이스 설계방안 연구)

  • Hanna Jung;Hae Won Kim;I Re Lee;Shinki An
    • Korean Medical Education Review
    • /
    • v.25 no.2
    • /
    • pp.84-101
    • /
    • 2023
  • Longitudinal data can provide important evidence with the potential to stimulate innovation and affect policies in medical education and can serve as a driving force for further developments in medical education through evidence-based decisions. Tracking and observing cohorts of students and graduates using longitudinal data can be a way to link the past, present, and future of medical education. This study reviewed practical methods and technical, administrative, and ethical considerations for the establishment and operation of a longitudinal database and presented examples of longitudinal databases. Cohort study design methods and previous examples of research using longitudinal databases to explore major topics in medical education were also reviewed. The implications of this study are as follows: (1) a systematic design process is required to establish longitudinal data, and each university should engage in ongoing deliberation about this issue; (2) efforts are needed to alleviate "survey fatigue" among respondents and reduce the administrative burden of those conducting data collection and analysis; (3) it is necessary to regularly review issues of personal information protection, data security, and ethics regarding the survey respondents; and (4) a system should be established that integrates and manages a longitudinal database of medical education at the national level. The hope is that establishing longitudinal data and cohorts at individual medical schools will not be a temporary phenomenon, but rather that they will be well utilized at the national level to innovate and implement ongoing changes in medical education.

A Heuristic Method of In-situ Drought Using Mass Media Information

  • Lee, Jiwan;Kim, Seong-Joon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.168-168
    • /
    • 2020
  • This study is to evaluate the drought-related bigdata characteristics published from South Korean by developing crawler. The 5 years (2013 ~ 2017) drought-related posted articles were collected from Korean internet search engine 'NAVER' which contains 13 main and 81 local daily newspapers. During the 5 years period, total 40,219 news articles including 'drought' word were found using crawler. To filter the homonyms liken drought to soccer goal drought in sports, money drought economics, and policy drought in politics often used in South Korea, the quality control was processed and 47.8 % articles were filtered. After, the 20,999 (52.2 %) drought news articles of this study were classified into four categories of water deficit (WD), water security and support (WSS), economic damage and impact (EDI), and environmental and sanitation impact (ESI) with 27, 15, 13, and 18 drought-related keywords in each category. The WD, WSS, EDI, and ESI occupied 41.4 %, 34.5 %, 14.8 %, and 9.3 % respectively. The drought articles were mostly posted in June 2015 and June 2017 with 22.7 % (15,097) and 15.9 % (10,619) respectively. The drought news articles were spatiotemporally compared with SPI (Standardized Precipitation Index) and RDI (Reservoir Drought Index) were calculated. They were classified into administration boundaries of 8 main cities and 9 provinces in South Korea because the drought response works based on local government unit. The space-time clustering between news articles (WD, WSS, EDI, and ESI) and indices (SPI and RDI) were tried how much they have correlation each other. The spatiotemporal clusters detection was applied using SaTScan software (Kulldorff, 2015). The retrospective and prospective cluster analyses were conducted for past and present time to understand how much they are intensive in clusters. The news articles of WD, WSS and EDI had strong clusters in provinces, and ESI in cities.

  • PDF

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

An adaptive digital watermark using the spatial masking (공간 마스킹을 이용한 적응적 디지털 워터 마크)

  • 김현태
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.3
    • /
    • pp.39-52
    • /
    • 1999
  • In this paper we propose a new watermarking technique for copyright protection of images. The proposed technique is based on a spatial masking method with a spatial scale parameter. In general it becomes more robust against various attacks but with some degradations on the image quality as the amplitude of the watermark increases. On the other hand it becomes perceptually more invisible but more vulnerable to various attacks as the amplitude of the watermark decreases. Thus it is quite complex to decide the compromise between the robustness of watermark and its visibility. We note that watermarking using the spread spectrum is not robust enought. That is there may be some areas in the image that are tolerable to strong watermark signals. However large smooth areas may not be strong enough. Thus in order to enhance the invisibility of watermarked image for those areas the spatial masking characteristics of the HVS(Human Visual System) should be exploited. That is for texture regions the magnitude of the watermark can be large whereas for those smooth regions the magnitude of the watermark can be small. As a result the proposed watermarking algorithm is intend to satisfy both the robustness of watermark and the quality of the image. The experimental results show that the proposed algorithm is robust to image deformations(such as compression adding noise image scaling clipping and collusion attack).

A Research in Applying Big Data and Artificial Intelligence on Defense Metadata using Multi Repository Meta-Data Management (MRMM) (국방 빅데이터/인공지능 활성화를 위한 다중메타데이터 저장소 관리시스템(MRMM) 기술 연구)

  • Shin, Philip Wootaek;Lee, Jinhee;Kim, Jeongwoo;Shin, Dongsun;Lee, Youngsang;Hwang, Seung Ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.169-178
    • /
    • 2020
  • The reductions of troops/human resources, and improvement in combat power have made Korean Department of Defense actively adapt 4th Industrial Revolution technology (Artificial Intelligence, Big Data). The defense information system has been developed in various ways according to the task and the uniqueness of each military. In order to take full advantage of the 4th Industrial Revolution technology, it is necessary to improve the closed defense datamanagement system.However, the establishment and usage of data standards in all information systems for the utilization of defense big data and artificial intelligence has limitations due to security issues, business characteristics of each military, anddifficulty in standardizing large-scale systems. Based on the interworking requirements of each system, data sharing is limited through direct linkage through interoperability agreement between systems. In order to implement smart defense using the 4th Industrial Revolution technology, it is urgent to prepare a system that can share defense data and make good use of it. To technically support the defense, it is critical to develop Multi Repository Meta-Data Management (MRMM) that supports systematic standard management of defense data that manages enterprise standard and standard mapping for each system and promotes data interoperability through linkage between standards which obeys the Defense Interoperability Management Development Guidelines. We introduced MRMM, and implemented by using vocabulary similarity using machine learning and statistical approach. Based on MRMM, We expect to simplify the standardization integration of all military databases using artificial intelligence and bigdata. This will lead to huge reduction of defense budget while increasing combat power for implementing smart defense.

Design and Implementation of 3D Geospatial Open Platform Based on HTML5/WebGL Technology (HTML5/WebGL 기반 3D 공간정보 오픈플랫폼 소프트웨어 설계 및 구현)

  • Kim, Min Soo;Jang, In Sung
    • Spatial Information Research
    • /
    • v.23 no.6
    • /
    • pp.57-66
    • /
    • 2015
  • Recently, the utilization of geospatial open platforms has been constantly increased and the interest in 3D geospatial data such as terrain, building and shopping mall has been increased significantly. In particular, rather than simplified 3D geospatial data, interest in high-precision 3D geospatial data which similarly represents the real world objects has increased significantly. In order to satisfy the demand for such the high-precision 3D geospatial data, various kinds of 3D geospatial open platforms has been developed and has provided services on the web. However, most of the 3D geospatial open platforms have been used plug-in module in order to ensure a fast 3D rendering performance on the web, despite the many problems such as difficulty of the installation, no supporting of cross browser/operating system and security issues. In addition, recently, the existing 3D geospatial open platforms based on plug-in module are facing a serious problem, by declaring the NPAPI service interruption in Chrome and Firefox browsers. In this study, we presents the design and implementation of a new 3D geospatial open platform based on HTML5/WebGL technology without the use of plug-ins. Such the new 3D geospatial open platform based on HTML5/WebGL may support cross browsers such as IE, Chrome, Firefox, Safari and cross OS platforms such as Windows, Linux, Mac and mobile OS platforms.

A Study on the Usefulness of Accounting Information for the Predication of Medium and Small Enterprises' Bankruptcy (중소기업 도산예측에 회계정보 유용성에 관한 연구)

  • Lee, Sung-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.5
    • /
    • pp.1460-1466
    • /
    • 2008
  • The purpose of this study is to verify how the accounting information of a bankrupt firm which is defined as a dishonor, an impaired total capital, a poor financial performance of a business, a rejection of auditor's opinion and an incongruity of auditor's opinion differs from that of a healthy firm on the basis of the index of financial affairs if the accounting information released by KOSDAQ is valuable. The sampling firms consists of 45 KOSDAQ firms that went bankrupt from 2000 to 2007 and 45 healthy firms which are selected in accordance with the sizes of assets. It has also selected the 30 sampling firms for the confirmation of the model in the same way. According to the result of the in-depth analysis, the variables related to security among the 17 indexes of financial affairs that have been used in this study for 5 years show a noticeable difference between a bankrupt firm and a healthy one. The accuracy of failed firms using this model for confirmation demonstrates 76.7% in 5 years before the bankruptcy, 76.7% in 4 years before that, 65.0% in 3 years before it, 76.7% in 2 years, 88.3% in 1 year. This data shows that the process from a healthy firm to a bankrupt one has progressed gradually and confirms the value of the index of financial affairs, exhibiting the accuracy with 83.8% of a presuming sample and 76.7% of a confirming sample for 5 years.

Effect of Mobile Devices on the Use Intention and Use of Mobile Banking Service in Myanmar (미얀마에서의 모바일기기 특성이 모바일 뱅킹 서비스 사용의도와 실제 사용에 미치는 영향 연구)

  • Myo, Salai Thar Kei;Hwang, Gee-Hyun
    • Journal of Digital Convergence
    • /
    • v.15 no.6
    • /
    • pp.71-82
    • /
    • 2017
  • Most banks in Myanmar have begun to provide their services via mobile phones. However, few studies investigated the factors that may help to set mobile services from a customer perspective. So, this study aims to propose and test a conceptual research model to predict the user's intention to use and actual use level of mobile banking service by combining UTAUT and DeLone-Mclean IS model. Data were collected from 206 citizens who had experienced mobile banking in various regions of Myanmar. The study found that performance expectancy, effort expectancy, information quality and service quality influence the user 's intention to adopt mobile banking services which directly affects the user's actual use of them. However, social influence, facilitating condition and system quality don't influence the user's intention. The study results contribute to meeting customer's needs and reducing customer risk in Myanmar's mobile banking industry, suggesting to seamlessly provide the necessary resources like technology improvements, organizational infrastructure and service centers. Another future study are required to include service's security and trust factors so that the service providers could gain their customers' reliability and trust.