• Title/Summary/Keyword: multi-perspective

Search Result 446, Processing Time 0.034 seconds

A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication

  • DongGyun Chu;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • v.20 no.1
    • /
    • pp.38-52
    • /
    • 2024
  • The 5G is the 5th generation mobile network that provides enhanced mobile broadband, ultra-reliable & low latency communications, and massive machine-type communications. New services can be provided through multi-access edge computing, network function virtualization, and network slicing, which are key technologies in 5G mobile communication. However, these new technologies provide new attack paths and threats. In this paper, we analyzed the overall threats of 5G mobile communication through a literature review. First, defines 5G mobile communication, analyzes its features and technology architecture, and summarizes possible security issues. Addition, it presents security threats from the perspective of user devices, radio access network, multi-access edge computing, and core networks that constitute 5G mobile communication. After that, security requirements for threat factors were derived through literature analysis. The purpose of this study is to conduct a fundamental analysis to examine and assess the overall threat factors associated with 5G mobile communication. Through this, it will be possible to protect the information and assets of individuals and organizations that use 5G mobile communication technology, respond to various threat situations, and increase the overall level of 5G security.

The Effects of Multi-identity on One's Psychological State and the Quality of Contribution in Virtual Communities: A Socio-Psychological Perspective

  • Suh, A-Young;Shin, Kyung-Shik;Lee, Ju-Min
    • Asia pacific journal of information systems
    • /
    • v.20 no.1
    • /
    • pp.57-79
    • /
    • 2010
  • In a virtual community, one can possess multiple identities and pretend to be different by creating self-identity in contrast with his or her actual self. Does false identity undermine the qualitative growth of a virtual community by reducing members' accountability? Or does it stimulate their contributive behaviors by ensuring freedom of speech? It is imperative to understand the effects of multi-identity considering the distinct properties of a virtual community in which people easily change their identities at little or no cost. To answer these questions, we adopted the concept of self-discrepancy from the social psychology theory rooted in the concept of the self and developed a theoretical model to predict quality of contribution of the individual member in virtual communities. Based on the self-discrepancy theory, we first identified two different domains of the self: (1) an "actual self" that consists of attributes that the person believes he or she currently possesses in real life and (2) a "cyber self" that consists of attributes the person believes he or she possesses in a virtual community. Next, we derived an index for two different types of self-discrepancy by using the differences between the actual and the cyber identities: Personal Self-discrepancy and Social Self-discrepancy. Personal Self-discrepancy reflects the degree of discrepancy between actual and cyber identity regarding a person's intelligence, education, and expertise. Social Self-discrepancy reflects the degree of discrepancy between actual and cyber identity regarding a person's morality, sociability, and accordance with social norms. Finally, we linked them with sense of virtual community, perceived privacy rights, and quality of contribution to examine how having a multi-identity influences an individual's psychological state and contributive behaviors in a virtual community. The results of the analysis based on 266 respondents showed that Social Self-discrepancy negatively influenced both the Sense of Virtual Community and Perceived Privacy Rights, while Personal Self-discrepancy negatively influenced only Perceived Privacy Rights, thereby resulting in reduced quality of contribution in virtual communities. Based on the results of this analysis, we can explain the dysfunctions of multi-identity in virtual communities. First, people who pretend to be different by engaging in socially undesirable behaviors under their alternative identities are more likely to suffer lower levels of psychological wellbeing and thus experience lower levels of sense of virtual community than others. Second, people do not perceive a high level of privacy rights reflecting catharsis, recovery, or autonomy, even though they create different selves and engage in socially undesirable behaviors in a virtual community. Third, people who pretend to be different persons in terms of their intelligence, education, or expertise also indirectly debase the quality of contribution by decreasing perceived privacy rights. The results suggest that virtual community managers should pay more attention to the negative influences exercised by multi-identity on the quality of contribution, thereby controlling the need to create alternative identities in virtual communities. We hope that more research will be conducted on this underexplored area of multi-identity and that our theoretical framework will serve as a useful conceptual tool for all endeavors.

A Qualitative Study on Multi-child Families' Investment in Human Capital (다자녀 가족의 인적자본 투자에 관한 질적연구)

  • Moon, Sook-Jae;Lee, Sung-Eun;Yang, Jung-Sun
    • Journal of Families and Better Life
    • /
    • v.25 no.6
    • /
    • pp.43-57
    • /
    • 2007
  • The objective of this study is to identify the significance of haying many children, their motive of childbirth, patterns of investment in human capital, and their expectations of their children. For this purpose, thirteen mothers of multi-child families have been interviewed in depth. Key findings of the study are as follows. First, the significance of children in many-child families varied. The fundamental features were: symbol of strong ties between God and humans, proud existence displayable to others about their level of happiness, and a means of defining their identity. Second, the typical motives of the majority of interviewees to have many children were "unplanned" but "natural accommodation and adaptation." Third, striking aspects, in terms of many-child families' investment in human capital were to consider many-child families to be a community in itself as a great environment of teaming and to have to deal with issues of limits and impartiality when allocating resources of a limited income and parents' time. Fourth, expectations of parents for their children were "normal growth" and mediocrity, and they cited intangible human assets as the greatest gift to their children. This study will hopefully offer a new analytical perspective to the growing concerns of low birth rates and excessive zeal of parents for their children's education, and thereby lay the groundwork of methodological approaches for resolving such social problems.

Study on Design Research using Semantic Network Analysis

  • Chung, Jaehee;Nah, Ken;Kim, Sungbum
    • Journal of the Ergonomics Society of Korea
    • /
    • v.34 no.6
    • /
    • pp.563-581
    • /
    • 2015
  • Objective: This study was conducted to investigate the potential of sematic network analysis for design research. Background: As HCD (Human-Centered Design) was emphasized, lots of design research methodologies were developed and used in order to find user needs. However, it is still difficult to discover users' latent needs. This study suggests the semantic network analysis as a complementary means for design research, and proved its potential through the practical application, which compares multi-screen purchase and usage behaviors between America and China. Method: We conducted an in-depth interview with 32 consumers from USA and China, and analyzed interview texts through semantic network analysis. Cross cultural differences in purchase and usage behaviors were investigated, based on measuring centrality and community modularity of devices, functions, key buying factors and brands. Results: Americans use more services and functions in the multi-screen environment, compared to Chinese. As a device substitutes other devices, traditional boundaries of the devices are disappearing in the USA. Americans consider function to recall Apple, but Chinese consider function, design and brand to recall Apple, Sony and Samsung as an important brand at the time of their purchase. Conclusion: This study shows the potential of semantic network analysis for design research through the practical application. Semantic network analysis presents how the concepts regarding a theme are structured in the cognitive map of users with visual images and quantitative data. Therefore, it can complement the qualitative analysis of the existing design research. Application: As the design environment becomes more and more complicated like multi-screen environment, semantic network analysis, which is able to provide design insights in the intuitive and holistic perspective, will be acknowledged as an effective tool for further design research.

Privacy Disclosure and Preservation in Learning with Multi-Relational Databases

  • Guo, Hongyu;Viktor, Herna L.;Paquet, Eric
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.3
    • /
    • pp.183-196
    • /
    • 2011
  • There has recently been a surge of interest in relational database mining that aims to discover useful patterns across multiple interlinked database relations. It is crucial for a learning algorithm to explore the multiple inter-connected relations so that important attributes are not excluded when mining such relational repositories. However, from a data privacy perspective, it becomes difficult to identify all possible relationships between attributes from the different relations, considering a complex database schema. That is, seemingly harmless attributes may be linked to confidential information, leading to data leaks when building a model. Thus, we are at risk of disclosing unwanted knowledge when publishing the results of a data mining exercise. For instance, consider a financial database classification task to determine whether a loan is considered high risk. Suppose that we are aware that the database contains another confidential attribute, such as income level, that should not be divulged. One may thus choose to eliminate, or distort, the income level from the database to prevent potential privacy leakage. However, even after distortion, a learning model against the modified database may accurately determine the income level values. It follows that the database is still unsafe and may be compromised. This paper demonstrates this potential for privacy leakage in multi-relational classification and illustrates how such potential leaks may be detected. We propose a method to generate a ranked list of subschemas that maintains the predictive performance on the class attribute, while limiting the disclosure risk, and predictive accuracy, of confidential attributes. We illustrate and demonstrate the effectiveness of our method against a financial database and an insurance database.

Analysis and Evaluation of DBMS Bulk Data Loading Through Multi-tiered Architecture for Heterogeneous Systems (이기종 시스템에서 다층 구조를 통한 DBMS 대용량 데이터 로딩의 분석 및 평가)

  • Tan, Hee-Yuan;Lim, Hyo-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.167-176
    • /
    • 2010
  • Managing the growing number of data generated through various processes requires the aid of Database Management System (DBMS) to efficiently handle the huge amount of data. These data can be inserted into database m real time or in batch, that come from multiple sources, including those that are coming from inside and outside of a network. The insertion of large amount of data is commonly done through specific bulk loading or insertion function supplied by each individual DBMS. In this paper, we analyze and evaluate on handling data bulk loading for heterogeneous systems that is organised as multi-tiered architecture and compare the result of DBMS bulk loader against program insertion from a software development perspective. We propose a hybrid solution using staging database that can be easily deployed for enhancing bulk loading performance compared to insertion by application.

Platform Calibration of an Aerial Multi-View Camera System (항공용 다각사진 카메라 시스템의 플랫폼 캘리브레이션)

  • Lee, Chang-No;Kim, Chang-Jae;Seo, Sang-Il
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.28 no.3
    • /
    • pp.369-375
    • /
    • 2010
  • Since multi-view images can be utilized for 3D visualization and surveying as well, a system calibration is an essential procedure. The cameras in the system are mounted to the holder and their locations and attitudes are relatively fixed. Therefore, the locations and the attitudes of the perspective centers of the four oblique looking cameras can be calculated using the location and attitude of the nadir looking camera and the boresight values between the cameras. In this regard, this research is focusing on the analysis of the relative location and attitude between the nadir and oblique looking cameras based on the results of the exterior orientation parameters after the aerial triangulation of the real multiview images. We acquired high standard deviations of the relative locations between the nadir and oblique cameras. Standard deviations of the relative attitudes between the cameras were low when only the exterior orientations of the oblique looking cameras were allowed to be adjusted. Moreover, low standard deviations of the relative attitudes came when we considered not all the exterior orientations of the cameras but the attitudes of them only.

Real-time 3D model generation system using multi-view images (다시점 영상을 이용한 실시간 3D 모델 생성 시스템)

  • Park, Jeong-Sun;Son, Hyung-Jae;Park, Jeung-Chul;Oh, Il-Seok
    • Journal of Digital Contents Society
    • /
    • v.18 no.2
    • /
    • pp.383-392
    • /
    • 2017
  • This paper introduces a real-time 3D model generation system that can process in real time from multi-view image acquisition to image-based 3D model generation. This system describes how to collect, transmit, and manage the HD images input from 18 cameras and explain the background separation and smooth 3D volume model generation process. This paper proposes a new distributed data transmission and reception method for real-time processing of HD images input from 18 cameras. In addition, we describe a codebook-based background separating algorithm and a modified marching cube algorithm using perspective difference interpolation to generate smooth 3D models from multi-view images. The system is currently being built with a throughput rate of 30 frames per second.

A Study on Resource Allocations of Multi Function Radar in a Warship (함정의 다기능레이더(MFR) 자원할당 방안에 관한 연구)

  • Park, Young-Man;Lee, Jinho;Cho, Hyunjin;Park, Kyeongju;Kim, Ha-Chul;Lim, Yo-Joon;Kim, Haekeun;Lee, Hochul;Chung, Suk-Moon
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.1
    • /
    • pp.67-79
    • /
    • 2019
  • A warship equipped with Multi Function Radar(MFR) performs operations by evaluating the degree of threats based on threats' symptom and allocating the resource of MFR to the corresponding threats. This study suggests a simulation-based approach and greedy algorithm in order to effectively allocate the resource of an MFR for warships, and compares these two approaches. As a detection probability function depending on the amount of allocations to each threat, we consider linear and exponential functions. Experimental results show that both the simulation-based approach and greedy algorithm allocate resource similarly to the randomly generated threats, and the greedy algorithm outperforms the simulation-based approach in terms of computational perspective. For a various cases of threats, we analyze the results of MFR resource allocation using the greedy algorithm.

Factors affecting the intention of Chinese and Vietnamese migrant women to have a second child: Comparison between the "National Survey on the Multi-Cultural Families" of 2009 and 2015 (중국, 베트남 결혼이주여성의 둘째자녀 출산의도 영향요인: 2009년, 2015년 전국다문화가족실태조사의 비교)

  • Ding, Jingya;Chin, Meejung;Ok, Sunwha
    • Journal of Family Relations
    • /
    • v.23 no.2
    • /
    • pp.133-155
    • /
    • 2018
  • Objectives: This study examined the differences in the intention of having a second child and the related factors among Chinese and Vietnamese migrant women from the perspective of adaptation theory. Methods: Data were drawn from the National Survey on Multi-Cultural Families in 2009 and 2015. Among the total 7,615 married migrant women (Korean-Chinese, Chinese-Han, Vietnamese), those within the age group 20-39 within the first 5 years of marriage who had one child were selected. A frequency analysis, chi-squared test, and logit regression analysis were performed. Results: Different ethnic groups had different reasons for having a second child and the related factors also differed between 2009 and 2015. In 2009, after controlling the related variables, the intention of Korean-Chinese and Chinese-Han married immigrant women to have a second child was higher than that of Vietnamese women, but no such difference was found in 2015. Participation in their local community, first marriage, the gender of the first child, and whether they were living with their parents-in-law were associated with the intention of migrant women having a second child in the 2009 analysis model but these factors were not significant in the 2015 analysis model. In the latter model, the household income, a variable related to economic conditions, has a positive effect on the intention of having a second child. Conclusions: The significance of this study supports adaptation theory by addressing the similarity in the childbirth intention between recently married immigrant women and Korean women.