• Title/Summary/Keyword: rights information

Search Result 985, Processing Time 0.035 seconds

Extraction and Taxonomy of Ransomware Features for Proactive Detection and Prevention (사전 탐지와 예방을 위한 랜섬웨어 특성 추출 및 분류)

  • Yoon-Cheol Hwang
    • Journal of Industrial Convergence
    • /
    • v.21 no.9
    • /
    • pp.41-48
    • /
    • 2023
  • Recently, there has been a sharp increase in the damages caused by ransomware across various sectors of society, including individuals, businesses, and nations. Ransomware is a malicious software that infiltrates user computer systems, encrypts important files, and demands a ransom in exchange for restoring access to the files. Due to its diverse and sophisticated attack techniques, ransomware is more challenging to detect than other types of malware, and its impact is significant. Therefore, there is a critical need for accurate detection and mitigation methods. To achieve precise ransomware detection, an inference engine of a detection system must possess knowledge of ransomware features. In this paper, we propose a model to extract and classify the characteristics of ransomware for accurate detection of ransomware, calculate the similarity of the extracted characteristics, reduce the dimension of the characteristics, group the reduced characteristics, and classify the characteristics of ransomware into attack tools, inflow paths, installation files, command and control, executable files, acquisition rights, circumvention techniques, collected information, leakage techniques, and state changes of the target system. The classified characteristics were applied to the existing ransomware to prove the validity of the classification, and later, if the inference engine learned using this classification technique is installed in the detection system, most of the newly emerging and variant ransomware can be detected.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Analysis and Management of Potential Development Area Using Factor of Change from Forest to Build-up (산림의 시가지 변화요인을 통한 잠재개발지 분석 및 관리방안)

  • LEE, Ji-Yeon;LIM, No-Ol;LEE, Sung-Joo;CHO, Hyo-Jin;SUNG, Hyun-Chan;JEON, Seong-Woo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.25 no.2
    • /
    • pp.72-87
    • /
    • 2022
  • For the sustainable development and conservation of the national land, planned development and efficient environmental conservation must be accompanied. To this end, it is possible to induce development and conservation to harmonize by deriving factors affecting development through analysis of previously developed areas and applying appropriate management measures to areas with high development pressure. In this study, the relationship between the area where the land cover changed from forest to urbanization and various social, geographical, and restrictive factors was implemented in a regression formula through logistic regression analysis, and potential development sites were analyzed for Yongin City. The factor that has the greatest impact on the analysis of potential development area is the restrict factors such as Green Belt and protected areas, and the factor with the least impact is the population density. About 148km2(52%) of Yongin-si's forests were analyzed as potential development area. Among the potential development sites, the area with excellent environmental value as a protected area and 1st grade on the Environment Conservation Value Assessment Map was derived as about 13km2. Protected areas with high development potential were riparian buffer zone and special measurement area, and areas with excellent natural scenery and river were preferred as development areas. Protected areas allow certain actions to protect individual property rights. However, there is no clear permit criteria, and the environmental impact of permits is not understood. This is identified as a factor that prevents protected areas from functioning properly. Therefore, it needs to be managed through clear exception permit criteria and environmental impact monitoring.

Ethical Dilemma and Empowerment among Dental Hygienists in Some Regions (일부 지역 치과위생사가 경험하는 윤리적 딜레마와 임파워먼트)

  • Kim, Mi-Jeong;Park, In-Suk
    • Journal of dental hygiene science
    • /
    • v.12 no.4
    • /
    • pp.383-391
    • /
    • 2012
  • The purpose of this study was to examine the ethical dilemma of dental hygienists and the level of empowerment among them in an attempt to provide some information on how to alleviate the ethical dilemma of dental hygienists to boost their empowerment. The findings of the study were as follows: The dental hygienists got a mean of 1.58 out of possible four points in ethical dilemma. Among the subfactors of ethical dilemma, they scored highest in ethical dilemma about dental hygienists and profession (1.79), followed by dental hygienists and patients (1.53), life reverence and respect for human rights (1.51) and dental hygienists and cooperators (1.49). As for the general characteristics of the dental hygienists, those who were better educated and who intended to temporarily work just until marriage fell into a more ethical dilemma. The dental hygienists got a mean of 3.05 out of possible five points in empowerment. Among the subfactors of it, they scored highest in support structure (3.52), opportunity structure (3.18), information structure (3.08) and resources structure (3.04). There were significant gaps among the dental hygienists in empowerment according to their attitude toward the dental hygienist job as a profession. There was a significant negative correlation between ethical dilemma and empowerment. Regarding influential factors for the ethical dilemma of the dental hygienists, marital status and empowerment were identified as significantly influential factors, and empowerment had a significant relationship to age, academic credential and ethical dilemma. Given the findings of the study, the development of various intervention programs and empowerment-boosting strategies is required to relieve dental hygienists of ethical dilemma.

E-Commerce in the Historical Approach to Usage and Practice of International Trade ("무역상무(貿易商務)에의 역사적(歷史的) 어프로치와 무역취인(貿易取引)의 전자화(電子化)")

  • Tsubaki, Koji
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.19
    • /
    • pp.224-242
    • /
    • 2003
  • The author believes that the main task of study in international trade usage and practice is the management of transactional risks involved in international sale of goods. They are foreign exchange risks, transportation risks, credit risk, risk of miscommunication, etc. In most cases, these risks are more serious and enormous than those involved in domestic sales. Historically, the merchant adventurers organized the voyage abroad, secured trade finance, and went around the ocean with their own or consigned cargo until around the $mid-19^{th}$ century. They did business faceto-face at the trade fair or the open port where they maintained the local offices, so-called "Trading House"(商館). Thererfore, the transactional risks might have been one-sided either with the seller or the buyer. The bottomry seemed a typical arrangement for risk sharing among the interested parties to the adventure. In this way, such organizational arrangements coped with or bore the transactional risks. With the advent of ocean liner services and wireless communication across the national border in the $19^{th}$ century, the business of merchant adventurers developed toward the clear division of labor; sales by mercantile agents, and ocean transportation by the steam ship companies. The international banking helped the process to be accelerated. Then, bills of lading backed up by the statute made it possible to conduct documentary sales with a foreign partner in different country. Thus, FOB terms including ocean freight and CIF terms emerged gradually as standard trade terms in which transactional risks were allocated through negotiation between the seller and the buyer located in different countries. Both of them did not have to go abroad with their cargo. Instead, documentation in compliance with the terms of the contract(plus an L/C in some cases) must by 'strictly' fulfilled. In other words, the set of contractual documents must be tendered in advance of the arrival of the goods at port of discharge. Trust or reliance is placed on such contractual paper documents. However, the container transport services introduced as international intermodal transport since the late 1960s frequently caused the earlier arrival of the goods at the destination before the presentation of the set of paper documents, which may take 5 to 10% of the amount of transaction. In addition, the size of the container vessel required the speedy transport documentation before sailing from the port of loading. In these circumstances, computerized processing of transport related documents became essential for inexpensive transaction cost and uninterrupted distribution of the goods. Such computerization does not stop at the phase of transportation but extends to cover the whole process of international trade, transforming the documentary sales into less-paper trade and further into paperless trade, i.e., EDI or E-Commerce. Now we face the other side of the coin, which is data security and paperless transfer of legal rights and obligations. Unfortunately, these issues are not effectively covered by a set of contracts only. Obviously, EDI or E-Commerce is based on the common business process and harmonized system of various data codes as well as the standard message formats. This essential feature of E-Commerce needs effective coordination of different divisions of business and tight control over credit arrangements in addition to the standard contract of sales. In a few word, information does not alway invite "trust". Credit flows from people, or close organizational tie-ups. It is our common understanding that, without well-orchestrated organizational arrangements made by leading companies, E-Commerce does not work well for paperless trade. With such arrangements well in place, participating E-business members do not need to seriously care for credit risk. Finally, it is also clear that E-International Commerce must be linked up with a set of government EDIs such as NACCS, Port EDI, JETRAS, etc, in Japan. Therefore, there is still a long way before us to go for E-Commerce in practice, not on the top of information manager's desk.

  • PDF

The Study on The Cyber Communities of Migrant Workers in Korea (한국 이주 노동자의 '사이버 공동체'에 관한 연구)

  • Lee, Jeong Hyang;Kim, Yeong Kyeong
    • Journal of the Korean association of regional geographers
    • /
    • v.19 no.2
    • /
    • pp.324-339
    • /
    • 2013
  • This study aims to investigate the characteristics of cyber communities composed of migrant workers from communities without propinquity in Korea. Its methods are both qualitative and quantitative. It further seeks to discover the relationship between the social capital formed and reproduced within these cyber communities and participants' cultural adaptation to Korean society. The study revealed that ethnic and non-ethnic communities differed in terms of strength of cohesion, space constraints, and links with the outside world. The former showed characteristics of a localized community type. The main motivations for migrant workers' participation in the ethnic cyber community were communication and friendship rather than cooperation and sharing among members. They usually used cyber communication media to communicate with one another. Conversely, the latter showed characteristics of an integrative type. Despite the difficulties in applying for membership and information provided in Korean, a high percentage of migrant workers participated in the community to obtain crucial information. The results did not show a significant correlation between social capital and migrant workers' traits within the cyber community, while a strong correlation emerged among four factors of social capital: faith, norms, networking, and political participation. The study showed that social capital in the cyber community was in direct proportion to an integrative type of cultural adaptation to Korean society. In particular, there was a strong connection between the cultural adaptation exhibited by members of the migrant subculture and their participation in discussions on political issues and human rights, with some migrants even functioning as agents of social change as participants in citizens' movements. The findings suggest that the cyber community facilitates the migrant subculture's communication with and integration into the indigenous Korean culture. Migrant workers' participation in the cyber community is therefore validated as an instrumental practice for members of this subculture to adapt to Korean society.

  • PDF

A Comparative Analysis over News Framing of the Abolition of the Family Headship (Hoju) System: Examining Three Major Korean Dailies: Chosun, Kukmin, Hankyoreh (호주제 폐지에 대한 뉴스 프레이밍 비교 연구: 조선일보, 국민일보, 한겨레신문을 중심으로)

  • Lee, Min-Kyu;Kim, Su-Jeong
    • Korean journal of communication and information
    • /
    • v.34
    • /
    • pp.132-160
    • /
    • 2006
  • The main purpose of this study is based on the comparative analysis over news framing of the family headship(Hoju) abolition in Korean society. This study examined the newspaper articles involving the Hoju abolition, which had been printed on the three major dailies, Chosun, Kukmin, Hankyoreh through February of 1990 to July of 2005. First, the news articles were analyzed and classified on the basis of their lengths, news types, main characters, news framing and systematic framing. Second, the articles that this study looked into were divided into the five major periods when the issue of the Hoju abolition in Korean society surfaced as a main social agenda to be discussed. Third, the main differences between the noticeable frame and unnoticeable frame in each period were analyzed through the three different perspectives which can also can be sub-divided into the six different attributes. This study found that the Hoju abolition as an attribute had developed into political, legal and social fields. The analysis of the research shows that the articles related to the patriarchy abolition showed more dominant frame which reflected the social change or the general tendency of the times. However, the analysis indicates that the articles in the level of an attribute included more dominant frame which mirrored a male chauvinism society. It also points out that the articles contained more dominant frame which was be used as a standard to find out the readers' political inclination. The articles also showed the dominant frame which included the revision and legal process of family laws before presidential or general election campaigns. The study also found that there were major differences among the three dailies. First of all, Chosun, regarded the Hoju as a custom by stressing that 'it is necessary to keep Hoju system to intensify the role and crisis of family if the Hoju will be abolished'. However, Hankyoreh recognized the issue as an important one to improve feminism and female rights by maintaining that 'it is the time to balance the inequality out between men and women with the abolition of patriarchy'. Finally, Kukmin treated the issue as an first step to acknowledge the dignity of females by emphasizing that 'a revision of the law is essential to accept the changing ethics of the times'.

  • PDF

A Study on the legal position of the carrier under the right of stoppage in transit of CISG (국제물품매매계약(CISG)의 운송유보권 하에서 운송인의 법적지위에 관한 연구)

  • Lim, Jaewook
    • International Commerce and Information Review
    • /
    • v.16 no.3
    • /
    • pp.159-182
    • /
    • 2014
  • CISG Article 71 (1) states that a party may suspend the performance of his obligations if, after the conclusion of the contract, it becomes apparent that the other party will net perform a substantial part of his obligations as a result of a serious deficiency in his ability to perform or in his creditworthiness or his conduct in preparing to perform or in perfoming the contract. CISG Article 71 (2) states a 'right of stoppage in transit' that if the seller has already dispatched the goods before the grounds described in the preceding paragraph become evident, he may prevent the handing over of the goods to the buyer even though the buyer holds a document which entitles him to obtain them. The present paragraph relates only to the rights in the goods as between the buyer and the seller. Under the right of stoppage in transit, the carrier copes with risks that the seller may claim damages arose from the handing over the goods, if he hand over the goods to the buyer and that the buyer may claim damages, if he deny handing over the goods to the buyer who has the document which entitles him to obtain the goods. Therefore the legal position of the carrier may become weak. This paper purpose to point out the legal weakness of the carrier under the right of stoppage in transit and to provide the proper legal act of the carrier and possible practice related to various characters of the contract of sale of the goods. Although there is the opinion it prevent from handing over the goods to the buyer actually under the interpretation that the buyer should take claim damages to the seller, if the goods are handed over to the buyer under the right of stoppage in transit, it is not appropriate because the opinion may disable the right of stoppage in transit. The right of stoppage in transit could be carried out under any payment conditions except letter of credit and under any mode of transportation except the cases that carrier is the buyer himself or the agent of the buyer. It could be executed regardless the forms of the transport document.

  • PDF

Legal issues on HAI (병원감염에서의 법적쟁점)

  • Lee, Soo kyoung;Yoon, Seok chan
    • The Korean Society of Law and Medicine
    • /
    • v.20 no.1
    • /
    • pp.133-162
    • /
    • 2019
  • Due to the nature of medical malpractice lawsuits, it is difficult for medical consumers, who are weak in getting information when it comes to health care problem, to secure all information inside the hospital. Even if you are confident about the hospital infection, it is true that people have difficult to obtain medical testimony by expert. It is seen as no easy task to testify to the malpractice of colleagues who work in the same field not only in our country but also abroad, when a doctor gives negative testimony to another doctor in a medical malpractice lawsuit. Although few health care providers will be motivated to take medical care from the outset, testimony or statements from a medical practitioner can have a significant impact on the outcome of a lawsuit, as it is impossible for the patient to control or be aware of the whole process of medical conduct, especially in the event of a hospital infection and the victim. If the hospital can prove the causality of damages caused by negligence of the employees or supervision of the hospital itself in a medical suit caused by the infection, the level of protection of the victim could be raised further. We sought to find a solution to these problems by looking at the provisions of other laws related to hospital infection. In particular, as the comparative legal review regarding hospital infection, Germany's legislative precedent sets a medical contract as a typical civil law contract, so it is thought that looking at German civil law regulations also has implications for Korean law. We also tried to improve the French Special Act 'rights of patients' and we can look at the consequent changes in court cases. Finally, the content of the U.S. case's and the theory of 'the doctrine of res ipsa loquitur' in relation to it show that doctors and hospitals have been forced to shift the burden of proof through this theory. This paper tried to find out the implications of mitigating the burden of proof by reviewing various issues that might be related to medical litigation of hospital infection from a comparative point of view.

Independent Production Routines and Environmental Changes In 'Comprehensive Programming Television Channels' in Korea Focusing on Interviews with Independent Producers, Broadcast Writers and Individuals Involved with the TV Channels (종합편성채널의 독립제작 환경과 관행에 관한 연구 독립PD, 작가 및 종합편성채널 관계자 심층인터뷰를 중심으로)

  • Choi, Sun Young;Han, Hee Jeong
    • Korean journal of communication and information
    • /
    • v.73
    • /
    • pp.56-91
    • /
    • 2015
  • This study examined changes in the independent production environment in the perspectives from flexible specialization of labor and media routines since January 2011, when comprehensive programming television channels (JTBC, MBN, Channel A, TV Chosun) emerged in Korea. In-depth interviews were conducted with thirteen individuals, including producers from independent production companies, broadcast writers, and individuals involved with these TV channels. The interview results indicated that a flexible specialization production system had been established by the comprehensive programming channels. This means that they were heavily dependent on independent producers, except in relations to their own news programs. Moreover, it was identified that the production of diverse programs could be difficult due to absurd contract practices such as those related to TV ratings and performance systems. Second, these channels have implemented some positive changes such as the payment of higher production costs and an incentive system, compared to terrestrial TV stations. However, the incentive system also helps to aggravate internal competition in the channel and also instigate contract competitions among independent companies, which can eventually result in the channels for holding exclusive rights to certain content and, hence, unfair business practices. Third, as a result of the newspaper and broadcast cross-owenership system of the comprehensive programming channels, hierarchical independent production practices can be established under the influence of newspaper proprietors and executives or managers who have previously worked for newspapers. Lastly, as a result of interviews with independent producers and individuals involved with the TV channels concerning the awareness of comprehensive programming channels, it could not be ascertained whether it is difficult to produce programs dealing with diverse items and genres, because programming autonomy has been distorted by capital or the advertisement market. In this circumstance, it is not surprising that some comprehensive programming channels mentioned that they prioritize profit and performance in programming. In conclusion, it is absolutely imperative that complementary and legal measures be implemented institutionally in order to redress the existing systematic dysfunctional routines in the independent productions of the comprehensive programming TV channels in Korea.

  • PDF