• Title/Summary/Keyword: keyboard

Search Result 468, Processing Time 0.025 seconds

A Study on Protecting for forgery modification of User-input on Webpage (웹 페이지에서 사용자 입력 값 변조 방지에 관한 연구)

  • Yu, Chang-Hun;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.635-643
    • /
    • 2014
  • Most of the web-based services are provided by a web browser. A web browser receives a text-based web page from the server and translates the received data for the user to view. There are a myriad of add-ons to web browsers that extend browser features. The browser's add-ons may access web pages and make changes to the data. This makes web-services via web browsers are vulnerable to security threats. A web browser stores web page data in memory in the DOM structure. One method that prevents modifications to web page data applies hash values to certain parts in the DOM structure. However, a certain characteristic of web-pages renders this method ineffective at times. Specifically, the user-input data is not pre-determined, and the hash value cannot be calculated prior to user input. Thus the modification to the data cannot be prevented. This paper proposes a method that both detects and inhibits any attempt to change to user-input data. The proposed method stores user-input from the keyboard and makes a comparison with the data transmitted from the web browser to detect any anomalies.

Shoulder Surfing Attack Modeling and Security Analysis on Commercial Keypad Schemes (어깨너머공격 모델링 및 보안 키패드 취약점 분석)

  • Kim, Sung-Hwan;Park, Min-Su;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1159-1174
    • /
    • 2014
  • As the use of smartphones and tablet PCs has exploded in recent years, there are many occasions where such devices are used for treating sensitive data such as financial transactions. Naturally, many types of attacks have evolved that target these devices. An attacker can capture a password by direct observation without using any skills in cracking. This is referred to as shoulder surfing and is one of the most effective methods. There has been only a crude definition of shoulder surfing. For example, the Common Evaluation Methodology(CEM) attack potential of Common Criteria (CC), an international standard, does not quantitatively express the strength of an authentication method against shoulder surfing. In this paper, we introduce a shoulder surfing risk calculation method supplements CC. Risk is calculated first by checking vulnerability conditions one by one and the method of the CC attack potential is applied for quantitative expression. We present a case study for security-enhanced QWERTY keyboard and numeric keypad input methods, and the commercially used mobile banking applications are analyzed for shoulder surfing risks.

Evaluation of environmental surface contamination and disinfection effects on multidrug-resistant organism (다제내성균 환경표면 오염도 및 소독 효과 평가)

  • Kim, Jae Yeun;Park, Jung Ae;Lee, Mi Hyang;Kim, Sang Ha;Jeong, Sun Young
    • Journal of Digital Convergence
    • /
    • v.19 no.1
    • /
    • pp.211-216
    • /
    • 2021
  • This study was carried out to evaluate the effects of disinfection using environmental disinfectant after having assessed the extent of contamination through microbial culture testing and the Adenosine Triphosphate Bioluminescence method among the environmental management evaluation methods used for the environment in the hospital ward of patients infected by multidrug-resistant organisms. This study was conducted with the patient wards isolated due to multidrug-resistant organisms as the environmental surface. Specimens were collected from five locations including infusion pumps, IV poles, bedside cabinets, bed railings, keyboards, and blood pressure measurement cuffs. ATP and microbial culture testing were executed prior to, immediately after, and five minutes post-disinfection. According to the result contamination of the infusion pumps was statistically significantly reduced after disinfection. In addition, the bacteria before and after disinfection reduced in IV pole, bed railing, and keyboard. That is, regular environmental surface disinfection can provide safer environments to patients against infection. Therefore, it is necessary to establish guidelines including disinfection methods and intervals for environmental surfaces by evaluating the persistence of disinfectants at various institutions in the future.

Analysis of User Experience for the Class Using Metaverse - Focus on 'Spatial' - (메타버스의 수업활용에 관한 사용자 경험 분석 - 스페이셜(Spatial)을 중심으로 -)

  • Lee, Yejin;Jung, Kwang-Tae
    • Journal of Practical Engineering Education
    • /
    • v.14 no.2
    • /
    • pp.367-376
    • /
    • 2022
  • In this study, the user experience was analyzed from the learner's point of view, focusing on the metaverse platform 'Spatial'. SUS(System Usability Scale) was used to evaluate the usability of the metaverse platform 'Spatial' in a college class, and the Magnitude estimation technique was used to evaluate the immersion and satisfaction with the class. In addition, a questionnaire survey was used to collect user experience opinions on the use of 'Spatial' as a teaching tool. Looking at the usability evaluation results of the 'Spatial' system, the students evaluated the usability, immersion, and satisfaction quite positively. Looking at the user experience of metaverse platform 'Spatial', it was found that students highly valued Metaverse as an educational tool that can provide a place for many people to gather and communicate even in a non-face-to-face space. Compared to other online platforms, metaverse has advantages in ease of use, interaction, immersion, and interest. In particular, in addition to keyboard, touch, and display, interaction using the five senses such as voice, motion, and gaze was recognized as a great advantage. On the other hand, it was found that high openness, freedom, and interest factors can both promote learning and inhibit learning. Nevertheless, it is judged that the metaverse platform 'Spatial' can be effectively applied in college classes because it enables various interactions between instructor and learner or between learner and learner.

A Study on Web accessibility situation of Public Institution and Major IT Companies Institutions (공공기관 및 IT 대기업의 웹 접근성 현황에 관한 연구)

  • Joo, Heon-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.175-187
    • /
    • 2009
  • This paper shows trends in domestic and foreign web accessibility. To disclose the web accessibility observance rate, seven central adminstration institutions and another seven north-eastern cities in Gyeong gi-Do and seven major IT companies were evaluated. KADO-WAH 2.0 was used for showing the observance rate. The evaluation criteria was that of Internet Web contents accessibility Guidelines 1.0. The evaluation was limited to Guideline 1 and Guideline 2 of non-text contents and the restricted frame usage and the keyboard-only operation. The average points for three items are as follows: 65.56% for North-Eastern cities in Gyeong gi-Do and 43.71% for Central adminstration institutions and the average 29.33% for major IT companies. The observance rate was highest by 99.3% in Human-rights committee among the central administration institutions. With the observance rate of 98%, Namyang-ju city came first in Gyeong gi-Do area. Samsung electronics was the highest with 63.66% in observance rate. The Central adminstration got lowered from the average 82.14% in 2006 to the average 54.28% in 2009, with the result of 27.86% down. Accordingly, the urgent improvement for Central adminstration and Local adminstration in web accessibility is asked for. The same is true with major IT companies in web accessibility.

Toward a Social Sciences Methodology for Electronic Survey Research on the Internet or Personal Computer check (사회과학 연구에 있어 인터넷 및 상업용 통신망을 이용한 전자설문 조사방법의 활용)

  • Hong Yong-Gee;Lee Hong-Gee;Chae Su-Kyung
    • Management & Information Systems Review
    • /
    • v.3
    • /
    • pp.287-316
    • /
    • 1999
  • Cyberspace permits us to more beyond traditional face-to-face, mail and telephone surveys, yet still to examine basic issues regarding the quality of data collection: sampling, questionnaire design, survey distribution, means of response, and database creation. This article address each of these issues by contrasting and comparing traditional survey methods(Paper-and-Pencil) with Internet or Personal Computer networks-mediated (Screen-and-Keyboard) survey methods also introduces researchers to this revolutionary and innovative tool and outlines a variety of practical methods for using the Internet or Personal Computer Networks. The revolution in telecommunications technology has fostered the rapid growth of the Internet all over the world. The Internet is a massive global network and comprising many national and international networks of interconnected computers. The Internet or Personal Computer Networks could be the comprehensive interactive tool that will facilitate the development of the skills. The Internet or Personal Computer Networks provides a virtual frontier to expand our access to information and to increase our knowledge and understanding of public opinion, political behavior, social trends and lifestyles through survey research. Comparable to other technological advancements, the Internet or Personal Computer Networks presents opportunities that will impact significantly on the process and quality of survey research now and in the twenty-first century. There are trade-offs between traditional and the Internet or Personal Computer Networks survey. The Internet or Personal Computer Networks is an important channel for obtaining information for target participants. The cost savings in time, efforts, and material were substantial. The use of the Internet or Personal Computer Networks survey tool will increase the quality of research environment. There are several limitations to the Internet or Personal Computer Network survey approach. It requires the researcher to be familiar with Internet navigation and E-mail, it is essential for this process. The use of Listserv and Newsgroup result in a biased sample of the population of corporate trainers. However, it is this group that participates in technology and is in the fore front of shaping the new organizations of interest, and therefore it consists of appropriate participants. If this survey method becomes popular and is too frequently used, potential respondents may become as annoyed with E-mail as the sometimes are with mail survey and junk mail. Being a member of the Listserv of Newsgroup may moderate that reaction. There is a need to determine efficient, effective ways for the researcher to strip identifiers from E-mail, so that respondents remain anonymous, while simultaneously blocking a respondent from responding to a particular survey instrument more than once. The optimum process would be on that is initiated by the researcher : simple, fast and inexpensive to administer and has credibility with respondents. This would protect the legitimacy of the sample and anonymity. Creating attractive Internet or Personal Computer Networks survey formats that build on the strengths of standardized structures but also capitalize on the dynamic and interactive capability of the medium. Without such innovations in survey design, it is difficult to imagine why potential survey respondents would use their time to answer questions. More must be done to create diverse and exciting ways of building an credibility between respondents and researchers on the Internet or Personal Computer Networks. We believe that the future of much exciting research is based in the Electronic survey research. The ability to communicate across distance, time, and national boundaries offers great possibilities for studying the ways in which technology and technological discourse are shaped. used, and disseminated ; the many recent doctoral dissertations that treat some aspect of electronic survey research testify to the increase focus on the Internet or Personal Computer Networks. Thus, scholars should begin a serious conversation about the methodological issues of conducting research In cyberspace. Of all the disciplines, Internet or Personal Computer Networks, emphasis on the relationship between technology and human communication, should take the lead in considering research in the cyberspace.

  • PDF

A historical study on the flexibility square-format typeface and the prospects - Focused on the three-pairs fonts of hangeul - (탈네모글꼴에 관한 역사적 연구와 전망 - 세벌식 한글 글꼴을 중심으로 -)

  • Yu, Jeong-Mi
    • Archives of design research
    • /
    • v.19 no.2 s.64
    • /
    • pp.241-250
    • /
    • 2006
  • Hangeul as the Korean unique characters were invented according to some character-making principles and based on scholars' exhaustive researches. While most of the characters in the world evolved naturally, Hangeul was invented based on a precise linguistic analysis of the time, and therefore, it is most scientific and reasonable among various characters throughout the world. Nevertheless, Hangeul typeface designs do not seem to inherit the ideology of scientific and reasonable Hangeul correctly. For the square forms have been used intact due to the influences from the Chinese characters which prevailed during the time. If a single set of square characters should be designed, as much as 11,172 fonts should be designed, which suggests that advantages of Mangeul may not well be used fully; Hangeul was invented to visualize every sound with the combinations of 28 vowels and consonants. Problems of such square fonts began to be identified since 1900's when typewriters were introduced first from the West. Since a typewriter is designed with 28 characters laid out on its keyboard by using such combinations, the letters may be easily combined on it. The so-called the flexibility square-format typeface was born as such. Specially, the three-pairs fonts of these can be combined up to 67 letters including vowels and consonants. The three-pairs fonts system can help to solve the problems arising form the conventional square fonts and inherit the original ideology of Hangeul invention. This study aims to review the history of the three-pairs fonts designs facilitated by mechanic encoding of Hangeul and thereupon, suggest some desirable directions for future Hangeul fonts. Since the flexibility square-format typeface is expected to evolve more and more owing to development of the digital technology, they would serve our age of information in terms of both functions and convenience. Just as Hunminjongum tried to be literally independent from the Chinese characters, so the flexibility square-format typeface designs would serve to recover identity of our Hangeul font designs.

  • PDF

Action effect: An attentional boost of action regardless of medium and semantics (의미적 표상 및 매개체와 무관한 단순 행동의 주의력 증진 효과)

  • Dogyun Kim;Eunhee Ji;Min-Shik Kim
    • Korean Journal of Cognitive Science
    • /
    • v.34 no.3
    • /
    • pp.153-180
    • /
    • 2023
  • Previous research on the action effect had shown how simple action towards a stimulus can enhance the processing of that stimulus in subsequent visual search task (Buttaccio & Hahn, 2011; Weidler & Abrams, 2014). In four experiments, we investigated whether semantic representation of action word can induce the same attentional boost towards that stimulus and whether the type of action performed can modulate the action effect. In experiment 1, we replicated the same experimental paradigm displayed in previous studies. Participants were first shown an action word cue - "go" or "no". When the action cue was "go", participants were to press a designated key, but not to when the action cue was "no". Next, participants performed a visual search task, in which they reported the orientation of a tilted bar. The target could appear on top of the previously shown prime object (valid), or not (invalid). Reaction times (RTs) to the search task were measure for analysis and comparison, and the action effect had been replicated. In experiment 2, participants were instructed to respond with the keyboard for the action task, and to respond with the joystick for the visual search task. In experiment 3, participants were instructed not to press any key on the onset of prime, and then perform the visual search task to isolate the effect of semantic representation. Lastly, in experiment 4, participants were instructed to press separate keys for "go" and "no" on the onset of prime, and then perform the visual search task. Results indicate that semantic representation alone did not modulate the action effect, regardless of type of action and medium of action.