• Title/Summary/Keyword: personal information management

Search Result 1,764, Processing Time 0.033 seconds

IoT Security Channel Design Using a Chaotic System Synchronized by Key Value (키값 동기된 혼돈계를 이용한 IoT의 보안채널 설계)

  • Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.981-986
    • /
    • 2020
  • The Internet of Things refers to a space-of-things connection network configured to allow things with built-in sensors and communication functions to interact with people and other things, regardless of the restriction of place or time.IoT is a network developed for the purpose of services for human convenience, but the scope of its use is expanding across industries such as power transmission, energy management, and factory automation. However, the communication protocol of IoT, MQTT, is a lightweight message transmission protocol based on the push technology and has a security vulnerability, and this suggests that there are risks such as personal information infringement or industrial information leakage. To solve this problem, we designed a synchronous MQTT security channel that creates a secure channel by using the characteristic that different chaotic dynamical systems are synchronized with arbitrary values in the lightweight message transmission MQTT protocol. The communication channel we designed is a method of transmitting information to the noise channel by using characteristics such as random number similarity of chaotic signals, sensitivity to initial value, and reproducibility of signals. The encryption method synchronized with the proposed key value is a method optimized for the lightweight message transmission protocol, and if applied to the MQTT of IoT, it is believed to be effective in creating a secure channel.

A Study on the Threats of Wiretapping and Effective Security Management Strategies (도청보안의 취약성 및 개선방안에 관한 연구)

  • Lee, Young Ho;Choi, Kyung Cheol;Woo, Sang Yeob
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.347-367
    • /
    • 2020
  • Rapid advancement of technology in today's society has allowed for easy access and use of data, promoting the process of informationization. Along with the merits of such development, unintended consequences of security risks involving wiretapping have been increasing as well. The security threats posed by wiretapping technology must be addressed by every organization and individual, as it could be used to leak confidential information about the nation's security, military and diplomatic strategies, industrial technologies, and personal information. Despite increasing threats stemming from the surrounding nations using advanced wiretapping technology, there is a lack of awareness at the government level, and the existing security measures for detecting and counteracting the wiretapping equipment are ineffective. In this research, the authors offered technical suggestions for improving the security strategies against the threats of wiretapping and information leakage by conducting a content analysis. The authors suggested the units of an agency be assigned a security grade based on its importance, and that adequate security equipment should be operated according to the grade. For instance, around-the-clock surveillance is recommended for grade-1 facilities, and portable wiretapping equipment detectors should be used to protect conference rooms and other key sites.

Design of Twitter data collection system for regional sentiment analysis (지역별 감성 분석을 위한 트위터 데이터 수집 시스템 설계)

  • Choi, Kiwon;Kim, Hee-Cheol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.506-509
    • /
    • 2017
  • Opinion mining is a way to analyze the emotions in the text and is used to identify the emotional state of the author and to find out the opinions of the public. As you can analyze individual emotions through opinion mining, if you analyze the text by region, you can find out the emotional state you have in each region. The regional sentiment analysis can obtain information that could not be obtained from personal sentiment analysis, and if a certain area has emotions, it can understand the cause. For regional sentiment analysis, we need text data created by region, so we need to collect data through Twitter crawling. Therefore, this paper designs a Twitter data collection system for regional sentiment analysis. The client requests the tweet data of the specific region and time, and the server collects and transmits the requested tweet data from the client. Through the latitude and longitude values of the region, it collects the tweet data of the area, and it can manage the text by region and time through collected data. We expect efficient data collection and management for emotional analysis through the design of this system.

  • PDF

A Study on the Functional Requirement of Subject Authority Data for Subject Authority Control (서지레코드의 주제전거를 위한 FRSAD 모형 연구)

  • Park, Zi-Young
    • Journal of Information Management
    • /
    • v.42 no.1
    • /
    • pp.113-135
    • /
    • 2011
  • The final report of the Functional Requirement of Subject Authority Data(FRSAD), the 3rd report of the FRBR family model, is announced by IFLA in June, 2010. This model represents the international trends of subject authority control and suggests a direction to the future subject authority record suitable for the FRBR system. Therefore aims of this study are to analysis the FRSAD model in context of the FRBR family and apply the model to the subject headings and bibliographic records of Korean National Library. For these aims, we analyse the model focused on the entities, attributes, and relationships between entities. From this analysis, we have found the openness of the FRSAD, which does not force a certain entity types and has focus on the conceptual aspects of the entity not only the form of the headings. Moreover, we suggest examples by applying the FRSAD frame and facets of the FAST to the Headings of the NLSH and related KORMARC fields. The scope of this study is the additional entities of the FRBR groups, so personal names, corporate names, family names and titles are not included. As a result, it is necessary to determine the criteria for the types of thema and to apply the types consistently in bibliographic records. A follow up research will be needed to suggest more detailed examples.

Changes in Consumption Life and Consumer Education in the Fourth Industrial Revolution (제4차 산업혁명 시대의 소비생활 변화와 소비자교육)

  • Jung, Joowon
    • Journal of Korean Home Economics Education Association
    • /
    • v.29 no.3
    • /
    • pp.89-104
    • /
    • 2017
  • Considering the advent of the Fourth Industrial Revolution, this study examines the changes and influences of intelligent information technology and the role of consumer education in the context of consumption life. The purpose of this study is to provide a theoretical foundation to effectively respond to the future consumption society as an independent consumer by enhancing the understanding of the Fourth Industrial Revolution in terms of consumption life. First, in terms of changes in the consumption paradigm in the Fourth Industrial Revolution, production and consumption are converged by being shared through a comprehensive connection platform in real time. Regarding the meaning of consumption, mental experience is being emphasized; moreover, usage and sharing, rather than ownership, are being highlighted. In terms of major changes in consumption life, the emergence of a more convenient smart consumption life and the possibility of personalized consumption optimized for individual demand are anticipated. Moreover, sustainable eco-friendly consumption is expected to increase further, and rapidly changing consumption trends will experience accelerated progress in consumer-centered changes. Next, the predicted problems in consumption life in the Fourth Industrial Revolution include unequal consumption due to intelligent information technology power center and the use and management of personal information data. Furthermore, ethical concerns related to the introduction of new technologies will become prominent, eventually resulting in issues concerning consumption satisfaction. To effectively respond to these new paradigm changes, consumer education should be value-centered. Ethical aspects of consumption should be considered, and consumption life should include trust and mutual cooperation. Furthermore, consumer education should facilitate creative convergence.

Analyzing the Study Trends of 'Sense of Place' Using Text Mining Techniques (텍스트마이닝 기법을 활용한 국내외 장소성 관련 연구동향 분석)

  • Lee, Ina;Kim, Hea-Jin
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.30 no.2
    • /
    • pp.189-209
    • /
    • 2019
  • Main Path Analysis (MPA) is one of the text mining techniques that extracts the core literature that contributes knowledge transfer based on citation information in the literature. This study applied various text mining techniques to abstract of the paper related with sense-of-place, which is published at Korea and abroad from 1990 to 2018 so that could discuss in a macro perspective. The main path analysis results showed that from 1990, overseas research on sense-of-place has been carried out in the order of personal identity, public land management, environmental education and urban development-related areas. Also, by using the network analysis, this study found that sense-of-place was discussed at various levels in Korea, including urban development, culture, literature, and history. On the other hand, it has been found that there are few topic changes in international studies, and that discussions on health, identity, landscape and urban development have been going on steadily since the 1990s. This study has implications that it presents a new perspective of grasping the overall flow of relevant research.

A Case Study on Real-time Live Video Streaming Content (실시간 방송 영상 콘텐츠 사례 연구)

  • SHI, YU;Chung, Jean-Hun
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.251-257
    • /
    • 2021
  • With the development of new media, great changes are taking place in the way people get information. The change is the use of video content that can deliver content in a more three-dimensional way than words or photos. After 2016, the number of live video streaming content providers and users has increased. In this paper the write takes the 1 personal live video streaming content as the research object. And the write takes live video streaming content on YouTube live or Douyu TV as a research example. In this paper, the writer analyzes the digital information content in the live video streaming case. And the writer expounds the necessity of these visual information and the characteristics of real-time live video streaming content. Especially since 2020, because of the influence of the COVID-19, the live video streaming industry has begun to combine with the traditional industry. It is expected that the integration of digital cutting-edge technology and live video streaming will not only provide diversity in the content, but also create more social value for the video content consumption culture. Therefore, The writer thinks it is necessary to conduct in-depth research on the social responsibility of real-time live content in the future.

Impacts of Perceived Value and Trust on Intention to Continue Use of Individuals' Cloud Computing: The Perception of Value-based Adoption Model (클라우드 컴퓨팅의 지각된 가치와 신뢰가 지속적 사용의도에 미치는 영향: 가치기반수용모델을 기반으로)

  • Kim, Sanghyun;Park, Hyunsun;Kim, Bora
    • Journal of Digital Convergence
    • /
    • v.19 no.1
    • /
    • pp.77-88
    • /
    • 2021
  • Cloud computing is getting a lot of attention by many people and businesses due to IT environmental changes such as the proliferation of smart devices, the increase of digital data, and the cost of IT resources. More individuals use personal cloud computing services for storing and managing information and data. Therefore, this study proposed determinants that are expected to have an influence on evaluating the value of cloud computing based on the value-based adoption model, examining the relationship between the continuous use intention of cloud computing. Results of the study show that usefulness, convenience of information access, extensibility had a positive impact on perceived value while privacy concerns and costs had a negative impact on perceived value. In addition, perceived value was found to have a significant effect on the intention to continue use of cloud computing. Finally, trust was found to have a significant effect on the perceived value and the intention to continue use of cloud computing. The findings are expected to provide useful information for understanding the factors that individual users consider important in the steadily growing cloud computing market.

Development of an IMU-based Wearable Ankle Device for Military Motion Recognition (군사 동작 인식을 위한 IMU 기반 발목형 웨어러블 디바이스 개발)

  • Byeongjun Jang;Jeonghoun Cho;Dohyeon Kim;Kyeong-Won Park
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.2
    • /
    • pp.23-34
    • /
    • 2023
  • Wearable technology for military applications has received considerable attention as a means of personal status check and monitoring. Among many, an implementation to recognize specific motion states of a human is promising in that allows active management of troops by immediately collecting the operational status and movement status of individual soldiers. In this study, as an extension of military wearable application research, a new ankle wearable device is proposed that can glean the information of a soldier on the battlefield on which action he/she takes in which environment. Presuming a virtual situation, the soldier's upper limbs are easily exposed to uncertainties about circumstances. Therefore, a sensing module is attached to the ankle of the soldier that may always interact with the ground. The obtained data comprises 3-axis accelerations and 3-axis rotational velocities, which cannot be interpreted by hand-made algorithms. In this study, to discern the behavioral characteristics of a human using these dynamic data, a data-driven model is introduced; four features extracted from sliced data (minimum, maximum, mean, and standard deviation) are utilized as an input of the model to learn and classify eight primary military movements (Sitting, Standing, Walking, Running, Ascending, Descending, Low Crawl, and High Crawl). As a result, the proposed device could recognize a movement status of a solider with 95.16% accuracy in an arbitrary test situation. This research is meaningful since an effective way of motion recognition has been introduced that can be furtherly extended to various military applications by incorporating wearable technology and artificial intelligence.

Investigating the Performance of Bayesian-based Feature Selection and Classification Approach to Social Media Sentiment Analysis (소셜미디어 감성분석을 위한 베이지안 속성 선택과 분류에 대한 연구)

  • Chang Min Kang;Kyun Sun Eo;Kun Chang Lee
    • Information Systems Review
    • /
    • v.24 no.1
    • /
    • pp.1-19
    • /
    • 2022
  • Social media-based communication has become crucial part of our personal and official lives. Therefore, it is no surprise that social media sentiment analysis has emerged an important way of detecting potential customers' sentiment trends for all kinds of companies. However, social media sentiment analysis suffers from huge number of sentiment features obtained in the process of conducting the sentiment analysis. In this sense, this study proposes a novel method by using Bayesian Network. In this model MBFS (Markov Blanket-based Feature Selection) is used to reduce the number of sentiment features. To show the validity of our proposed model, we utilized online review data from Yelp, a famous social media about restaurant, bars, beauty salons evaluation and recommendation. We used a number of benchmarking feature selection methods like correlation-based feature selection, information gain, and gain ratio. A number of machine learning classifiers were also used for our validation tasks, like TAN, NBN, Sons & Spouses BN (Bayesian Network), Augmented Markov Blanket. Furthermore, we conducted Bayesian Network-based what-if analysis to see how the knowledge map between target node and related explanatory nodes could yield meaningful glimpse into what is going on in sentiments underlying the target dataset.