477 results on '"Kyungho Lee"'
Search Results
202. Money Laundering in the Bitcoin Network: Perspective of Mixing Services
- Author
-
Mookyu Park, Junwoo Seo, Kyungho Lee, and Haengrok Oh
- Subjects
Service (business) ,Situation awareness ,Computer science ,Perspective (graphical) ,Sample (statistics) ,02 engineering and technology ,Money laundering ,Computer security ,computer.software_genre ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,computer ,Mixing (physics) - Abstract
Various crimes using Bitcoin are highlighted. Among various crimes using Bitcoin, this paper suggests a method to detect money laundering focusing on mixing service that provides Money Laundering. This is part of the anti-money-laundering (AML) strategy, which can determine whether the mixer service is used in certain transactions by using transaction sample data using mixer. Money laundering using Bitcoin is often used to avoid fund tracking in the underground world and analyzing it is essential in situational awareness of fund tracking.
- Published
- 2018
203. Comparison Study between the Cyber Weapon System and the Conventional Weapons Systems on Their Core Technologies Levels and Features
- Author
-
Kyungho Lee, Ho-gyun Lee, and Jong-in Lim
- Subjects
Weapon system ,Cyberwarfare ,Core (game theory) ,Computer science ,Comparison study ,Information security ,Computer security ,computer.software_genre ,computer - Published
- 2016
204. Hierarchically micro-/mesoporous Pt/KL for alkane aromatization: Synergistic combination of high catalytic activity and suppressed hydrogenolysis
- Author
-
Kyungho Lee and Minkee Choi
- Subjects
Alkane ,chemistry.chemical_classification ,Chemistry ,Aromatization ,02 engineering and technology ,Microporous material ,Alkylation ,010402 general chemistry ,021001 nanoscience & nanotechnology ,Photochemistry ,01 natural sciences ,Catalysis ,0104 chemical sciences ,Hydrogenolysis ,Physical and Theoretical Chemistry ,0210 nano-technology ,Mesoporous material ,Zeolite - Abstract
Pt/KL is a highly active and selective monofunctional catalyst for aromatization of n-alkanes due to its 1-dimensionally connected cage-like micropores. The unique micropore structure of the KL zeolite, however, can also inhibit the diffusion of bulky aromatic products out of the catalyst, which can cause unwanted side reactions that can decrease the aromatic yields. In this work, we investigated the effect of secondary mesoporosity, which can substantially facilitate molecular diffusion in Pt/KL during C6–C8 alkane aromatizations. The results showed that the hierarchically micro-/mesoporous Pt/KL synthesized with a subsequent dealumination/desilication method exhibited enhanced aromatic yields, compared with a conventional Pt/KL. In particular, in C7 and C8 aromatizations, the hierarchical Pt/KL showed substantially less formation of dealkylated aromatic products than the Pt/KL due to suppressed secondary hydrogenolysis. Pt supported on a solely mesoporous γ-Al2O3 also showed significantly suppressed secondary hydrogenolysis (dealkylation), which indicates that fast diffusion of alkylated aromatics out of the catalyst structure is important for suppressing the secondary hydrogenolysis. However, the solely mesoporous Pt/γ-Al2O3 showed markedly lower aromatization activities than the KL-supported catalysts, which indicates that Pt located inside the zeolite micropores is crucial for obtaining high catalytic activity due to the preorganization of n-alkanes in the micropores. The present results showed that the hierarchical Pt/KL provides the synergistically combined benefits of the Pt/KL and the mesoporous Pt catalyst, namely high aromatization activity and suppressed secondary hydrogenolysis, respectively.
- Published
- 2016
205. Effects of sarah/nebula knockdown on Aβ42-induced phenotypes during Drosophila development
- Author
-
Kyungho Lee, Yoon Ki Hong, Yoon Seok Suh, Soojin Lee, Se Min Bang, Soojin Hwang, Haemin Jeong, Kyoung Sang Cho, and Jang Ho Lee
- Subjects
0301 basic medicine ,Genetics ,Gene knockdown ,Kinase ,Cell ,Phosphatase ,Endogeny ,Biology ,medicine.disease_cause ,Biochemistry ,Phenotype ,Cell biology ,Calcineurin ,03 medical and health sciences ,030104 developmental biology ,0302 clinical medicine ,medicine.anatomical_structure ,medicine ,Molecular Biology ,030217 neurology & neurosurgery ,Oxidative stress - Abstract
The Down syndrome critical region 1 (DSCR1), a Down syndrome-associated protein, is an endogenous inhibitor of the Ca2+-dependent phosphatase calcineurin. It has been also suggested to be associated with Alzheimer’s disease (AD) but the role of DSCR1 in the pathogenesis of AD still remains controversial. In this paper, we investigated the effects of knockdown of sarah (sra), a Drosophila DSCR1 ortholog, on the Aβ42-induced developmental phenotypes of Drosophila. Knockdown of sra showed detrimental effects on the rough eye phenotype and survival of Aβ42-expressing flies without altering the Aβ42 accumulation. Furthermore, the knockdown of sra increased glial cell numbers in the larval brains and its susceptibility to oxidative stress. Overexpression of an active form of calcineurin produced similar results to sra knockdown as they both exacerbated the Aβ42-induced rough eye phenotype. However, sra knockdown did not alter apoptosis or c-Jun N-terminal kinase activation in Aβ42-expressing flies. In conclusion, our results suggest that sra does play an important role in Aβ42-induced developmental defects in Drosophila without affecting its stress responses.
- Published
- 2016
206. Strategic Decision Making Model Among Collective Intelligences Using The Game Theory in Cyber Attacks - Case study of KHNP Hacking
- Author
-
Sangmin Park, Kyungho Lee, and Jong-in Lim
- Subjects
Government ,Computer science ,Collective intelligence ,02 engineering and technology ,Computer security ,computer.software_genre ,Hacktivism ,Cyberwarfare ,020204 information systems ,Psychological Warfare ,0202 electrical engineering, electronic engineering, information engineering ,Cyber-attack ,020201 artificial intelligence & image processing ,computer ,Game theory ,Hacker - Abstract
Recently various types of cyber attacks have occurred. The strategic goals & tactical means of these have evolved. Especially KHNP cyber attack was the type of hacktivism combined hack and psychological warfare. The cyber attackers have forecd the nation to participate in the cyber warfare and the government to make strategic decisions to the releases of confidential information and the threats of stopping KHNP. In this paper, we would like to study the effective strategic decision-making model utilizing the game theory and including an attack intelligence on open policy Decision framework.
- Published
- 2016
207. An Improved Model of Effectiveness on the Implementation of Personal Information Utilization Agreement in Financial Companies
- Author
-
Kyungho Lee and Gi-hyun Jang
- Subjects
060201 languages & linguistics ,Finance ,Computer science ,Process (engineering) ,business.industry ,media_common.quotation_subject ,TheoryofComputation_GENERAL ,06 humanities and the arts ,02 engineering and technology ,Agreement ,0602 languages and literature ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Personally identifiable information ,media_common - Abstract
It is required to have Personal Information Agreement when a fi nancial company uses personal information by the Law of Privacy. So, financial companies have to demand customers the s ubmission of Personal Information Agreement. Thus, financial companies have made Personal Information Agreement in various f ormats for customers. However, financial companies are lack of a verification process, the cases of collecting invalid Agreement often occurred. This study focuses on the verification pr ocess of Personal Information Agreement and the contents of Personal Information Agreement. In conclusion, this study proposes an improved model that added to the process of verification for th e concept of Agreement. Based on this study, I hope financial companies to reform their agreement process and to improve the effectiveness on the implementation of Personal Information Utilization Agreement. Keywords: Personal Information, Utilization, Written Agreement, Verification procedures, Personal Information Agreement
- Published
- 2016
208. A Decision-Making Model for Handling Personal Information Using Metadata
- Author
-
Yang-Ho Kim, Kyungho Lee, and In-hyun Cho
- Subjects
Computer science ,business.industry ,Process (engineering) ,020206 networking & telecommunications ,02 engineering and technology ,Information security ,Computer security ,computer.software_genre ,Insider ,Metadata ,0202 electrical engineering, electronic engineering, information engineering ,Systems architecture ,020201 artificial intelligence & image processing ,business ,Personally identifiable information ,computer ,Decision-making models ,Risk management - Abstract
After realizing through the three large-scale data leakage incidents that intentional or accidental insider jobs are more seri ous than external intrusions, financial companies in Korea have bee n taking measures to prevent data leakage from occuring again. But, the IT system architecture reflecting the domestic financi al environment is highly complicated and thereby difficult to grasp. It is obvious that despite administrative, physical, and techni cal controls, insider threats are likely to cause personal data leakage. In this paper, we present a process that based on metadata defi nes and manages personally identifiable attribute data, and that through inter-table integration identifies personal information broadly and controls access. This process is to decrease the likelihood of violating compliance outlined by the financial su pervisory authority, and to reinforce internal controls. We der ive and verify a decision-making model that reflects the proposed p rocess.Keywords: Personally Identifiable Information, Compliance, Information S ecurity, Risk Management, Metadata
- Published
- 2016
209. The chalcone derivative HymnPro generates reactive oxygen species through depletion of intracellular glutathione
- Author
-
Da Hyun Lee, Soon Young Shin, Young Han Lee, You Jung Jung, Dongsoo Koh, Ji-Ho Kim, and Kyungho Lee
- Subjects
0301 basic medicine ,chemistry.chemical_classification ,Reactive oxygen species ,Programmed cell death ,Cell cycle checkpoint ,biology ,Organic Chemistry ,Glutathione ,General Biochemistry, Genetics and Molecular Biology ,Cell biology ,03 medical and health sciences ,chemistry.chemical_compound ,030104 developmental biology ,Tubulin ,chemistry ,Apoptosis ,biology.protein ,Bioorganic chemistry ,Caspase - Abstract
2-Hydroxy-4-methoxy-2′,3′-benzochalcone (HymnPro), a chalcone derivative, induces cell cycle arrest at the G2/M phase followed by caspase-dependent apoptosis. Structurally, HymnPro contains a α-β olefin that can act as a Michael acceptor, and that is involved in the depletion of cellular glutathione. However, the effect of HymnPro on the generation of reactive oxygen species (ROS) is still unknown. In the present study, we observed that treatment of Capan-1 pancreatic cancer cells with HymnPro resulted in a dose-dependent accumulation of ROS, owing to the depletion of intracellular glutathione. Treatment with ROS scavenger N-acetylcycteine prevented HymnPro-induced caspase activation and cell death, but had little effect on G2/M cell cycle arrest and microtubule assembly. Our results suggest that HymnPro causes tubulin binding-mediated cell cycle arrest at the G2/M phase as well as ROS-mediated caspase activation.
- Published
- 2016
210. The natural flavone eupatorin induces cell cycle arrest at the G2/M phase and apoptosis in HeLa cells
- Author
-
Soon Young Shin, Young Han Lee, Kyungho Lee, Da Hyun Lee, and You Jung Jung
- Subjects
0301 basic medicine ,Cell cycle checkpoint ,biology ,Chemistry ,Organic Chemistry ,Cleavage (embryo) ,biology.organism_classification ,Molecular biology ,General Biochemistry, Genetics and Molecular Biology ,Cell biology ,HeLa ,03 medical and health sciences ,030104 developmental biology ,0302 clinical medicine ,Cyclin D1 ,Apoptosis ,030220 oncology & carcinogenesis ,biology.protein ,Cytotoxic T cell ,Cyclin B1 ,Polymerase - Abstract
Eupatorin (5,3′-dihydroxy-6,7,4′-trimethoxyflavone) is a natural flavone exhibiting antiproliferative activity in diverse cancer cell lines. In the present study, we characterized the cytotoxic effect of eupatorin in HeLa cervical carcinoma cells. Treatment with eupatorin induced cell cycle arrest at the G2/M phase within 12 h, followed by the induction of apoptosis. Eupatorin down-regulated cyclin D1 within 3 h, whereas up-regulated cyclin B1 levels after 12 h. Eupatorin also accumulated p53, p21, and Bax levels and stimulated the cleavage of caspase-3, caspase-7, and poly(ADP-ribose) polymerase after 12 h of treatment. In addition, we found that eupatorin-induced p21 expression was p53-dependent, while Bax expression was Egr-1-dependent pathway. Our results suggest that eupatorin induces G2/M cell cycle arrest through dysregulation of cell cycle regulatory proteins and triggers apoptosis through activation of the p53-dependent and p53-independent pathways.
- Published
- 2016
211. A methoxyflavanone derivative, 2′,3′,4′-trimethoxy-5,6-naphthoflavanone, inhibits proliferation of HCT116 human colon cancer cells by inducing G2/M cell cycle arrest and apoptosis
- Author
-
Dongsoo Koh, Da Hyun Lee, You Jung Jung, Kyungho Lee, Young Han Lee, and Soon Young Shin
- Subjects
0301 basic medicine ,education.field_of_study ,Cell cycle checkpoint ,medicine.diagnostic_test ,biology ,Chemistry ,Organic Chemistry ,Population ,Cleavage (embryo) ,Molecular biology ,General Biochemistry, Genetics and Molecular Biology ,Cell biology ,Flow cytometry ,03 medical and health sciences ,chemistry.chemical_compound ,030104 developmental biology ,0302 clinical medicine ,Apoptosis ,030220 oncology & carcinogenesis ,medicine ,biology.protein ,Cytotoxicity ,education ,Flavanone ,Polymerase - Abstract
A methoxylated flavanone derivative, 2′,3′,4′-trimethoxy-5,6-naphthoflavanone (TMNF), was synthesized, and its anti-proliferative activity was evaluated. In HCT116 colon cancer cells, TMNF inhibited cellular proliferation and triggered cytotoxicity. A flow cytometry assay showed that TMNF caused cell cycle arrest at the G2/M phase with a concomitant decrease in the population of G1 phase cells. Furthermore, TMNF caused accumulation of p53 and its downstream target, Bax, and stimulated cleavage of caspase-7 and poly(ADP-ribose) polymerase. These data suggest that methoxylated naphthoflavanone can be an attractive pharmacophore for further development of therapeutic adjuvants.
- Published
- 2016
212. Advanced Risk Measurement Approach to Insider Threats in Cyberspace
- Author
-
Inhyun Cho and Kyungho Lee
- Subjects
business.industry ,Computer science ,Process (engineering) ,Insider threat ,02 engineering and technology ,Computer security ,computer.software_genre ,Theoretical Computer Science ,Insider ,Computational Theory and Mathematics ,Artificial Intelligence ,Order (exchange) ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Position (finance) ,020201 artificial intelligence & image processing ,Leakage (economics) ,business ,Cyberspace ,computer ,Software ,Risk management - Abstract
Inside jobs have been a source of critical threats in cyberspace. To manage such insider threats, a proper measurement approach is required for effective risk-based decision-making. The measurement approach should include insider-related information (e.g. the significance of jobs, the position level, the required authority for data, and the type of employment) in order to better measure and analyze insider risks. In this paper, we suggest an approach that takes into account the insider-related information in calculating data leakage risk of insiders in the banking sector. We implement this approach by utilizing real-world data to calculate insider risks. We present an effective risk measurement approach, which we believe can enhance decision-making process for risk management for insider threats.
- Published
- 2016
213. Salubrinal-Mediated Upregulation of eIF2α Phosphorylation Increases Doxorubicin Sensitivity in MCF-7/ADR Cells
- Author
-
Jaewook Cho, Jin Hyun Kim, Mini Jeong, Kyungho Lee, Jong-Il Shin, and Yong-Joon Jeon
- Subjects
0301 basic medicine ,Transcriptional Activation ,DNA damage ,Cell Survival ,Eukaryotic Initiation Factor-2 ,Apoptosis ,Pharmacology ,Article ,Salubrinal ,03 medical and health sciences ,chemistry.chemical_compound ,Downregulation and upregulation ,Cell Line, Tumor ,Protein Phosphatase 1 ,medicine ,Humans ,Doxorubicin ,eIF2α phosphorylation ,Phosphorylation ,skin and connective tissue diseases ,Molecular Biology ,Antibiotics, Antineoplastic ,Thiourea ,Drug Synergism ,Cell Biology ,General Medicine ,Gene Expression Regulation, Neoplastic ,030104 developmental biology ,chemistry ,Cell culture ,Cinnamates ,Drug Resistance, Neoplasm ,Cancer research ,GADD34 ,MCF-7 Cells ,Female ,Signal transduction ,ER stress ,medicine.drug ,MCF-7/ADR cells, doxorubicin resistance ,Signal Transduction - Abstract
Eukaryotic translation initiation factor 2 alpha (eIF2α), which is a component of the eukaryotic translation initiation complex, functions in cell death and survival under various stress conditions. In this study, we investigated the roles of eIF2α phosphorylation in cell death using the breast cancer cell lines MCF-7 and MCF-7/ADR. MCF-7/ADR cells are MCF-7-driven cells that have acquired resistance to doxorubicin (ADR). Treatment of doxorubicin reduced the viability and induced apoptosis in both cell lines, although susceptibility to the drug was very different. Treatment with doxorubicin induced phosphorylation of eIF2α in MCF-7 cells but not in MCF-7/ADR cells. Basal expression levels of Growth Arrest and DNA Damage 34 (GADD34), a regulator of eIF2α, were higher in MCF-7/ADR cells compared to MCF-7 cells. Indeed, treatment with salubrinal, an inhibitor of GADD34, resulted in the upregulation of eIF2α phosphorylation and enhanced doxorubicin-mediated apoptosis in MCF-7/ADR cells. However, MCF-7 cells did not show such synergic effects. These results suggest that dephosphorylation of eIF2α by GADD34 plays an important role in doxorubicin resistance in MCF-7/ADR cells.
- Published
- 2016
214. Advanced Mandatory Authentication Architecture Designed for Internet Bank
- Author
-
Ki-seok Hong and Kyungho Lee
- Subjects
Authentication ,Computer science ,business.industry ,Internet privacy ,Business model ,Computer security ,computer.software_genre ,Internet security ,Attack model ,Identification (information) ,Security association ,The Internet ,business ,computer ,Vulnerability (computing) - Abstract
Non-face-to-face real name verification policy that financial authorities announced, in order to secure a face-to-face or more of accuracy, are in principle of multi check. The business model and legal entities of Internet banks is different from existing Internet banking. Relpacing real name verification from face-to-facd to non-face-to-face while maintaining the structure of identification can not only cause inconvenience to a first time member, but also can be more vulnerable to verious security risks. In this study, to evaluate a service level of a bank of the Internet, and provide an improved identification of the structure such that the registration and use of differentiated services is performed in accordance with the evaluation. In addition, the security that may occur with respect to Bank of the Internet to establish a vulnerability and attack model, the results of the analysis of the safety of the step-by-step security attributes and services of the authentication medium of each attack model, existing the safer than Internet banking, confirmed the usefulness in user registration guide.
- Published
- 2015
215. Decision Making Model for Selecting Financial Company Server Privilege Account Operations
- Author
-
Kyungho Lee and Suk-Won Lee
- Subjects
Finance ,Computer science ,business.industry ,Principle of least privilege ,Analytic hierarchy process ,Privilege (computing) ,Information security ,Computer security ,computer.software_genre ,Account Status ,business ,computer ,Decision-making models ,Hacker - Abstract
The server privilege account must be operated through law and r egulation. However, due to regulation non-compliance and inadequate operation on financial company server privilege, an incident that every server data being deleted by hacker occur which is later being named as ‘NH Bank Cyber Attack’. In this p aper, the current operation status on financial company privilege accounts is being analysed to elicit problems and imp rovement. From the analysis, important evaluation factors will be also selected and applied generating the decision making model for financial company server privilege account operation. The evaluation factor deducted from privilege account status analys is will be used to present and verify the decision making model and formula through AHP(Analytic Hierarchy process).Keywords: Server Privilege Account, AHP, Information Security, Decision Making I.서 론 1) 1.1연구배경 및 목적2011년 4월12일 농협 전산망 해킹 사건이 발생하여 내부서버 180대(전체 440대), 웹서버 45대(전체 98대), 테스트 서버 48대(전체 49대) 총 273대(전체 587대) 서버의 모든 데이터가 삭제되어 농협 전
- Published
- 2015
216. Effective Risk Level Assessment Using Three-Dimensional Vector Visualization
- Author
-
Juyoung Lee, In-hyun Cho, Jaehee Lee, and Kyungho Lee
- Subjects
Risk analysis ,business.industry ,Process (engineering) ,Computer science ,Risk management information systems ,Information security ,computer.software_genre ,Visualization ,Identification (information) ,Confidentiality ,Data mining ,business ,computer ,Risk management - Abstract
Risk analysis is utilized in devising measures to manage information security risk to an acceptable level. In this risk management decision-making, the visualization of risk is important. However, the pre-existing risk visualization method is limited in visualizing risk factors three-dimensionally. In this paper, we propose an improved risk visualization method which can facilitate the identification of risk from the perspective of confidentiality, integrity, and availability respectively or synthetically. The proposed method is applied to an enterprise's risk analysis in order to verify how effective it is. We argue that through the proposed method risk levels can be expressed three-dimensionally, which can be used effectively for information security decision-making process for internal controls.
- Published
- 2015
217. Study on Selection Methodology of Applicable Prospective Civil Information Security Technologies in Defense Cyberwarfare Sector
- Author
-
Kyungho Lee, Jong-in Lim, and Ho-gyun Lee
- Subjects
Cyberwarfare ,Government ,Spillover effect ,Management science ,Computer science ,Field (Bourdieu) ,Subject (documents) ,Plan (drawing) ,Information security ,Investment (macroeconomics) ,Industrial organization - Abstract
This paper suggests a methodology for linking technology classi fication of nongovernmental information security field and technology classification of cyber-warfare in national defense field. Based on this methodology, Multi-Attribute Utility Theory(MAUT) is applied for the purpose of selecting promising nongovernmental technology that is worthy of later introduction or development. After studying the result of the survey regarding the research progression plan of the selected promising technology, the following three facts are discovered: Firstly, the greater the social spillover effect, the greater the need for the government lead R&D. Secondly, among the spillover effects, the social aspect has the highest correlation with respect to the need for the government lead R&D, while the economical aspect a nd the technological aspect come in the second and the third place, respectively. Finally, according to the correlation analysis, the defense application and the technological importance do not affect the subject of investment or the subject of development. This indicates that even though the R&D for technology with high social spillover effect should be lead by the government, the subject of the investment or the development cannot be determined solely by factors such as military application and t echnological importance.Keywords: Cyberwarfare, Information Security, Multi-Attribute Utility Theory, Technological Planning
- Published
- 2015
218. Advanced protocol against MITM attacks in Industrial Control System
- Author
-
Sangkyo Oh, Moo-seong Ko, and Kyungho Lee
- Subjects
Authentication ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Intrusion detection system ,Industrial control system ,Man-in-the-middle attack ,Stuxnet ,Computer security ,computer.software_genre ,Airfield traffic pattern ,PROFINET ,SCADA ,business ,computer ,Computer network - Abstract
If the industrial control system is infected by malicious worm such as Stuxnet, national disaster could be caused inevitably. Therefore, most of the industrial control system defence is focused on intrusion detection in network to protect against these threats. Conventional method is effective to monitor network traffic and detect anomalous patterns, but normal traffic pattern attacks using MITM technique are difficult to be detected. This study analyzes the PROFINET/DCP protocol and weaknesses with the data collected in real industrial control system. And add the authentication data field to secure the protocol, find out the applicability. Improved protocol may prevent the national disaster and defend against MITM attacks.
- Published
- 2015
219. An advanced approach to security measurement system
- Author
-
In-hyun Cho, Youngin You, and Kyungho Lee
- Subjects
Computer science ,Standard of Good Practice ,02 engineering and technology ,Asset (computer security) ,Computer security ,computer.software_genre ,Security information and event management ,Security testing ,Critical infrastructure ,Theoretical Computer Science ,Information security audit ,Information security management ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Control system security ,020203 distributed computing ,Cloud computing security ,Information security ,Computer security model ,Security service ,Hardware and Architecture ,Security through obscurity ,Security convergence ,Network security policy ,computer ,Software ,Information Systems - Abstract
The importance of information security has increased gradually. Initially, the notion of information security was limited to only a few areas. Now, it has expanded to cover a variety of areas. For example, critical infrastructure facilities such as power plants are operated online using industrial control systems so that the facilities are exposed to cyber threats. This is also the case with the other fields that are operated online. Each field requires appropriate information security management. Thus, this paper proposes an advanced security measurement system that reflects the characteristics of each field to achieve effective information security management.
- Published
- 2015
220. A Study on Parallax Registration for User Location onthe Transparent Display using the Kinect Sensor
- Author
-
Kyungho Lee, Jung-Min Lee, Byeong-Wook Nam, and Yuepeng Wu
- Subjects
Geographic information system ,business.industry ,Distortion (optics) ,International standard ,Transparent display ,law.invention ,Lens (optics) ,Geography ,law ,Computer graphics (images) ,Information system ,Computer vision ,Artificial intelligence ,Parallax ,business - Abstract
International Hydrographic Organization(IHO) adopted standard S-100 as the international standard Geographic Information System(GIS) that can be generally used in the maritime sector. Accordingly, the next-generation system to support navigation information based on GIS standard technology has being developed. AR based navigation information system that supported navigation by overlapping navigation information on the CCTV image has currently being developed. In this study, we considered the application of a transparent display as a method to support efficiently this system. When a transparent display applied, the image distortion caused by using a wide-angle lens for parallax secure, and the disc s, and demonstrated the applicability of the technology by developing a prototype.
- Published
- 2015
221. Push-recovery stability of biped locomotion
- Author
-
Jehee Lee, Kyungho Lee, Jiwon Jeong, Soon Sun Kwon, Moon Seok Park, Carol O'Sullivan, and Yoonsang Lee
- Subjects
Preferred walking speed ,Normal gait ,Gait (human) ,Computer science ,Control theory ,Gait analysis ,Effect of gait parameters on energetic cost ,Computer Graphics and Computer-Aided Design ,Gait ,Simulation - Abstract
Biped controller design pursues two fundamental goals; simulated walking should look human-like and robust against perturbation while maintaining its balance. Normal gait is a pattern of walking that humans normally adopt in undisturbed situations. It has previously been postulated that normal gait is more energy efficient than abnormal or impaired gaits. However, it is not clear whether normal gait is also superior to abnormal gait patterns with respect to other factors, such as stability. Understanding the correlation between gait and stability is an important aspect of biped controller design. We studied this issue in two sets of experiments with human participants and a simulated biped. The experiments evaluated the degree of resilience to external pushes for various gait patterns. We identified four gait factors that affect the balance-recovery capabilities of both human and simulated walking. We found that crouch gait is significantly more stable than normal gait against lateral push. Walking speed and the timing/magnitude of disturbance also affect gait stability. Our work would provide a potential way to compare the performance of biped controllers by normalizing their output gaits and improve their performance by adjusting these decisive factors.
- Published
- 2015
222. A novel synthetic chalcone derivative promotes caspase-dependent apoptosis through ROS generation and activation of the UPR in MH7A cells
- Author
-
Kyungho Lee, Jaewook Cho, Jin Hyun Kim, Young Han Lee, Dongsoo Koh, Chae Yun Baek, Soon Young Shin, Yoongho Lim, Jong-Il Shin, and Yong-Joon Jeon
- Subjects
Gene knockdown ,Downregulation and upregulation ,Apoptosis ,Binding protein ,Genetics ,Unfolded protein response ,Viability assay ,CHOP ,Biology ,Molecular Biology ,Biochemistry ,Molecular biology ,Caspase-Dependent Apoptosis - Abstract
Chalcones, one class of polyphenolic compounds synthesized as secondary metabolites during flavonoid biosynthesis in plants, have anti-inflammatory and antitumorigenic effects. In this study, we investigated the roles of a novel chalcone derivative, (E)-3-(3,5-dimethoxyphenyl)-1-(1-hydroxynaphthalen-2-yl)prop-2-en-1-one (DK-59), on rheumatoid arthritis (RA) fibroblast-like synoviocyte MH7A cells. DK-59 treatment reduced cell viability and induced caspase-mediated apoptosis in MH7A cells; activation of caspase-7 and caspase-3, as well as fragmentation of poly (ADP-ribose) polymerase (PARP-1), occurred in a time-dependent manner, and treatment with a pan-caspase inhibitor, Z-VAD, significantly reduced DK-59-mediated PARP-1 cleavage. DK-59-mediated apoptosis was caused by the production of intracellular reactive oxygen species (ROS); DK-59 treatment induced ROS production in a time-dependent manner, and treatment with the antioxidant N-acetyl-l-cysteine significantly inhibited DK-59-mediated fragmentation of PARP-1 and recovered cell viability. Many genes that function in the unfolded protein response (UPR), including inositol-requiring protein 1, X-box binding protein 1, and C/EBP homologous protein (CHOP), were upregulated by DK-59 treatment. CHOP knockdown by lentivirus infection reduced DK-59-mediated PARP-1 cleavage, suggesting that CHOP plays a proapoptotic role in DK-59-mediated apoptosis in MH7A cells. Taken together, the results suggest that DK-59-mediated induction of ROS and activation of the UPR can be used as a target for the therapeutic treatment of RA.
- Published
- 2015
223. Perioperative risk factors of progressive chronic kidney disease following liver transplantation: analyses of a 10-year follow-up single-center cohort
- Author
-
Jae-Won Joh, Wooseong Huh, Gaabsoo Kim, Hye Ryoun Jang, Jung Eun Lee, Jong Man Kim, Kyungho Lee, Kyunga Kim, Suk-Koo Lee, and Junseok Jeon
- Subjects
medicine.medical_specialty ,medicine.medical_treatment ,Urology ,Kidney failure ,Renal function ,030230 surgery ,Liver transplantation ,urologic and male genital diseases ,03 medical and health sciences ,0302 clinical medicine ,Diabetes mellitus ,medicine ,Renal insufficiency ,business.industry ,Acute kidney injury ,Retrospective cohort study ,Perioperative ,medicine.disease ,female genital diseases and pregnancy complications ,Risk factors ,Cohort ,Original Article ,030211 gastroenterology & hepatology ,Surgery ,business ,Kidney disease - Abstract
Purpose The incidence of chronic kidney disease (CKD) has been increasing due to improved survival after liver transplantation (LT). Risk factors of kidney injury after LT, especially perioperative management factors, are potentially modifiable. We investigated the risk factors associated with progressive CKD for 10 years after LT. Methods This retrospective cohort study included 292 adult patients who underwent LT at a tertiary referral hospital between 2000 and 2008. Renal function was assessed by the e stimated glomerular filtration rate (eGFR) using the Modification of Diet in Renal Disease formula. The area under the curve of serial eGFR (AUCeGFR) was calculated for each patient to assess the trajectory of eGFR over the 10 years. Low AUCeGFR was considered progressive CKD. Linear regression analyses were performed to examine the associations between the variables and AUCeGFR. Results Multivariable analysis showed that older age (regression coefficient = −0.53, P < 0.001), diabetes mellitus (DM) (regression coefficient = −6.93, P = 0.007), preoperative proteinuria (regression coefficient = −16.11, P < 0.001), preoperative acute kidney injury (AKI) (regression coefficient = −14.35, P < 0.001), postoperative AKI (regression coefficient = −3.86, P = 0.007), and postoperative mean vasopressor score (regression coefficient = −0.45, P = 0.034) were independently associated with progressive CKD. Conclusion More careful renoprotective management is required in elderly LT patients with DM or preexisting proteinuria. Postoperative AKI and vasopressor dose may be potentially modifiable risk factors for progressive CKD.
- Published
- 2020
224. Situational Awareness Framework for Cyber Crime Prevention Model in Cyber Physical System
- Author
-
Junhyoung Oh, Junwoo Seo, Minhee Joo, Kyungho Lee, and Mookyu Park
- Subjects
Situation awareness ,Computer science ,business.industry ,020209 energy ,Cyber-physical system ,02 engineering and technology ,Factor analysis of information risk ,Computer security ,computer.software_genre ,complex mixtures ,Electronic mail ,stomatognathic diseases ,stomatognathic system ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,0202 electrical engineering, electronic engineering, information engineering ,Crime prevention through environmental design ,business ,Cyberspace ,Personally identifiable information ,computer ,Risk management - Abstract
Recently, IoT, 5G mobile, big data, and artificial intelligence are increasingly used in the real world. These technologies are based on convergenced in Cyber Physical System(Cps). Cps technology requires core technologies to ensure reliability, real-time, safety, autonomy, and security. CPS is the system that can connect between cyberspace and physical space. Cyberspace attacks are confused in the real world and have a lot of damage. The personal information that dealing in CPS has high confidentiality, so the policies and technique will needed to protect the attack in advance. If there is an attack on the CPS, not only personal information but also national confidential data can be leaked. In order to prevent this, the risk is measured using the Factor Analysis of Information Risk (FAIR) Model, which can measure risk by element for situational awareness in CPS environment. To reduce risk by preventing attacks in CPS, this paper measures risk after using the concept of Crime Prevention Through Environmental Design(CPTED).
- Published
- 2018
225. Beyond kidney dialysis and transplantation: what's on the horizon?
- Author
-
Rabb, Hamid, Kyungho Lee, Parikh, Chirag R., and Lee, Kyungho
- Subjects
- *
TREATMENT of chronic kidney failure , *KIDNEYS , *KIDNEY transplantation , *HEMODIALYSIS - Abstract
The article presents the discussion on exciting developments in kidney research having the potential in transforming treatment beyond dialysis and transplantation. Topics include wearable artificial kidney and implantable bioartificial kidney having the potential in providing continuous dialysis throughout the day; and clinical trial being stopped early due to technical issues showing variable flow rates and carbon dioxide bubbles in the dialysis circuit.
- Published
- 2022
- Full Text
- View/download PDF
226. What are the optimum quasi-identifiers to re-identify medical records?
- Author
-
Kyungho Lee and Yong Ju Lee
- Subjects
Information retrieval ,Computer science ,Medical record ,De-identification ,Inference ,020207 software engineering ,02 engineering and technology ,Medical research ,Data sharing ,Identifier ,0202 electrical engineering, electronic engineering, information engineering ,Range (statistics) ,Data Protection Act 1998 ,020201 artificial intelligence & image processing - Abstract
Recently, medical records are shared to online for a purpose of medical research and expert opinion. There is a problem with sharing the medical records. If someone knows the subject of the record by using various methods, it can result in an invasion of the patient's privacy. To solve the problem, it is important to carefully address the tradeoff between data sharing and privacy. For this reason, de-identification techniques are applicable to address the problem. However, de-identified data has a risk of re-identification. There are two problems with using de-identification techniques. First, de-identification techniques may damage data utility although it may decrease a risk of re-identification. Second, de-identified data can be re-identified from inference using background knowledge. The objective of this paper is to analyze the probability of re-identification according to inferable quasi-identifiers. We analyzed factors, inferable quasi-identifiers, which can be inferred from background knowledge. Then, we estimated the probability of re-identification from taking advantage of the factors. As a result, we determined the effect of the re-identification according to the type and the range of inferable quasi-identifiers. This paper contributes to a decision on de-identification target and level for protecting patient's privacy through a comparative analysis of the probability of re-identification according to the type and the range of inference.
- Published
- 2018
227. Reminder as ‘Watch-Out’: The Role of Privacy Salience at the Point of Interaction with Biometric Systems
- Author
-
Kyungho Lee, Junhyoung Oh, and Ukjin Lee
- Subjects
Biometrics ,Biometric system ,business.industry ,Computer science ,Data_MISCELLANEOUS ,05 social sciences ,Internet privacy ,Theory of planned behavior ,050801 communication & media studies ,Usability ,Fingerprint recognition ,Public interest ,0508 media and communications ,Salience (neuroscience) ,0502 economics and business ,050211 marketing ,Information presentation ,business - Abstract
Biometrics users are concerned about privacy issues, while personal recognition methods are automated and easy to use. For users who want to protect their biometric information, practitioners need to take action in the public interest to better prevent users from leaking their biometric information in situations where the user interacts with the biometric system. This study explores how the user can perceive the consequences of registering biometric information through the Theory of Planned Behavior and attitude aspects. Sensitivity to potential consequences of the biological system was confirmed by the behavior and response observed by the subjects after using the biometric system. The sensitivity of the experimental group was found to be higher than that of the control group. Therefore, this study suggests that simple information presentation in system interaction can lead to more protective against privacy issue.
- Published
- 2018
228. Threat Analysis of Wi-Fi Connected Dashboard Camera
- Author
-
Dahee Choi, Won Mok Park, and Kyungho Lee
- Subjects
Authentication ,business.industry ,Computer science ,media_common.quotation_subject ,Dashboard (business) ,Attack tree ,STRIDE ,Usability ,Computer security ,computer.software_genre ,Data flow diagram ,Information security standards ,Function (engineering) ,business ,computer ,media_common - Abstract
Recently dashboard camera (dashcam) has a function of connecting Wi-Fi to a smartphone for usability. But, it has severe vulnerabilities that it doesn't have authentication process. We analyzed threats of overall functions of dashcam using Data Flow Diagram and STRIDE analysis. After that, we found that dashcam’ s vulnerabilities are closely related to Wi-Fi function and lack of authentication process. We made sets of possible attacks and presented as attack trees. Attack Tree Analysis was used to categorize and prioritize among several ways of possible attacks. This research contributes to suggest vulnerabilities of a dashcam. This emphasizes the importance that information security standards of dashcam should be made and manufacturers of dashcam should apply the standards.
- Published
- 2018
229. A Review of Cyber Security Controls from An ICS Perspective
- Author
-
Kyungho Lee, Juhyeon Lee, Junhyoung Oh, and Youngin You
- Subjects
021110 strategic, defence & security studies ,Point (typography) ,Computer science ,business.industry ,Control (management) ,0211 other engineering and technologies ,Information technology ,02 engineering and technology ,Information security ,Industrial control system ,Computer security ,computer.software_genre ,Security controls ,Critical infrastructure ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,NIST ,business ,computer - Abstract
As cyber attacks on national critical infrastructure have increased, researches are actively conducted to protect industrial control systems(ICS). Compared with existing IT systems, research on special attributes of ICS has been performed mainly, and based on this, many security requirements for ICSs have been derived. However, there is insufficient research on security control to understand and improve the security status of target ICS. To the best of our knowledge, only a comprehensive guide to applying existing security controls to ICSs is being presented. Therefore, this study suggests implications for the current security control items from the ICS point of view. For this purpose, each viewpoint for categorizing and analyzing information security control items was established and based on this, an integrated matrix of ICS security control was derived. Through the ICS security control matrix, the information security control items currently being guided are analyzed from the viewpoint of the ICS, and the present status and implications are derived. The findings can be used as an indicator to effectively apply appropriate controls to appropriate locations where security is required. It is also expected to be a useful reference for improving and supplementing security control items currently being used and used.
- Published
- 2018
230. Cyber Influence Attack: Changes in Cyber Threats Seen in the Russian Hacking Incident
- Author
-
Kyungho Lee, Moosung Park, and Mookyu Park
- Subjects
021110 strategic, defence & security studies ,Government ,Impeachment ,Presidential election ,Computer science ,media_common.quotation_subject ,0211 other engineering and technologies ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,02 engineering and technology ,Deception ,Computer security ,computer.software_genre ,Social issues ,Silence ,Dismissal ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,computer ,media_common ,Hacker - Abstract
As the Russian government is revealed that it had intervened in the US presidential election by hacking, the social confusion caused by cyber attacks increased. This incident has led to the impeachment of the president by the dismissal of FBI director James Comey. In the French presidential election held in 2017, the social confusion created because of fake news during the period of election silence. The past cyber attacks were used as deception tactics, like the Georgian war. Nowadays, these attacks are concentrated in the period of social issues. In other words, these recent changes in cyber attacks have begun to have an adverse effect on systems in the real world, such as hybrid battlefields. This attack is called cyber influence attacks. This paper identifies the weaknesses of the basic democratic election system and classifies it against cyber influence attacks. In addition, we analyze the cyber influence attacks in Russia during the US presidential election in 2016 as a case study.
- Published
- 2018
231. Breaking Text CAPTCHA by Repeated Information
- Author
-
Kyungho Lee, Moosung Park, and Jae Hyeon Woo
- Subjects
021110 strategic, defence & security studies ,Information retrieval ,CAPTCHA ,Simple (abstract algebra) ,Computer science ,Sample (material) ,0211 other engineering and technologies ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,02 engineering and technology ,computer.software_genre ,computer ,Image (mathematics) - Abstract
CAPTCHA is a simple challenge-response tool to determine whether the user is a bot or human. The user must answer required text, calculate questions, or choose some images from the provider’s choice. D portal site, which is one of the most famous web portal site in Korea, asks text response in CAPTCHA image when joining a cafe group, but this CAPTCHA is structured in a very regular format which can be read very simply if used repeatedly. We can read the text characters by bot with very high accuracy through some easy steps, among 2,000 sample CAPTHCAs.
- Published
- 2018
232. Apoptotic and Anti-Inflammatory Effects of Eupatorium japonicum Thunb. in Rheumatoid Arthritis Fibroblast-Like Synoviocytes
- Author
-
Jong-Il Shin, Sung Hun Kim, Sol Lee, Ye Sun Han, Kyungho Lee, Yong-Joon Jeon, Ji Beom Kim, Hak Cheol Kwon, Inki Kim, and Yoon Gyeong Lee
- Subjects
0301 basic medicine ,Article Subject ,Eupatorium ,Anti-Inflammatory Agents ,lcsh:Medicine ,Arthritis ,Eupatorium japonicum ,Inflammation ,CHOP ,General Biochemistry, Genetics and Molecular Biology ,Arthritis, Rheumatoid ,03 medical and health sciences ,Synovitis ,medicine ,Humans ,Cells, Cultured ,General Immunology and Microbiology ,biology ,Plant Extracts ,Chemistry ,Synovial Membrane ,lcsh:R ,NF-kappa B ,General Medicine ,Fibroblasts ,medicine.disease ,biology.organism_classification ,Synoviocytes ,030104 developmental biology ,medicine.anatomical_structure ,Apoptosis ,Rheumatoid arthritis ,Cancer research ,medicine.symptom ,Synovial membrane ,Research Article - Abstract
Rheumatoid arthritis (RA) is a chronic autoimmune inflammatory disease characterized by synovitis, hyperplasia, and the destruction of bone and cartilage. A variety of immunosuppressive biological agents have been developed because the pathogenesis of RA is related predominantly to the inflammatory response. However, rheumatoid arthritis fibroblast-like synovial cells (RAFLS), which are known to play an important role in RA progression, exhibit resistance to immunosuppressants through cancer-like properties. In this study, we identified a novel therapeutic compound for RA, which reduced inflammation and the abnormal proliferation of RAFLS in natural product library made from Korean native plants. Eupatorium japonicum Thunb. (EJT) extract, a component of the natural product library, most effectively reduced viability through the induction of ROS-mediated apoptosis in a dose-dependent manner. In addition, the increased ROS induced the expression of ATF4 and CHOP, key players in ER stress-mediated apoptosis. Interestingly, EJT extract treatment dose-dependently reduced the expression of IL-1β and the transcription of MMP-9, which were induced by TNF-α treatment, through the inhibition of NF-κB and p38 activation. Collectively, we found that EJT extract exerted apoptotic effects through increases in ROS production and CHOP expression and exerted anti-inflammatory effects through the suppression of NF-κB activation, IL-1β expression, and MMP-9 transcription.
- Published
- 2018
- Full Text
- View/download PDF
233. Complex Network of Damage Assessment Using GMM Based FAIR
- Author
-
Junwoo Seo, Moosung Park, Kyoung Min Kim, Mookyu Park, Minhee Joo, and Kyungho Lee
- Subjects
Router ,Exploit ,business.industry ,Computer science ,Node (networking) ,05 social sciences ,Complex network ,Degree distribution ,050105 experimental psychology ,Networking hardware ,03 medical and health sciences ,0302 clinical medicine ,Convergence (routing) ,0501 psychology and cognitive sciences ,Macro ,business ,030217 neurology & neurosurgery ,Computer network - Abstract
With the recent increase in IoT devices, network connectivity devices such as routers or switches are increasing. This increase in equipment could increase the degree of a particular node (hub node or hub router) in terms of network characteristics. In other words, the structure of the network can be changed into a more complicated network form. The convergence of links to these specific nodes provides an opportunity for attackers to enjoy maximum benefit at minimal cost. An attacker can attack only a few hub routers with a high degree of network structure, which can paralyze networks in some areas. This possibility is because the actual network follows the power degree distribution. These research measures threats based on network characteristics and data on exploits of network equipment. The threat measurement is applied to the FAIR(Factor Analysis of Information Risk) model, and the damage caused by the macro network structure is assessed.
- Published
- 2018
234. Risk Management to Cryptocurrency Exchange and Investors Guidelines to Prevent Potential Threats
- Author
-
Kyungho Lee and Chang Yeon Kim
- Subjects
Finance ,Cryptocurrency ,business.industry ,Computer science ,05 social sciences ,Vulnerability ,020206 networking & telecommunications ,02 engineering and technology ,Investment (macroeconomics) ,Currency ,Server ,0502 economics and business ,Management system ,0202 electrical engineering, electronic engineering, information engineering ,business ,Know-how ,050203 business & management ,Risk management - Abstract
Investment and interest in cryptocurrency is rapidly growing. The price of each bitcoin, in particular, has exceeded 10,000 dollars as of November 2017, so we do not know how long the uptrend will continue. Although blockchain technology is more open and security oriented than conventional currency issuing methods, it is relatively ineffective in terms of distribution and management of cryptocurrency. The most common way to get cryptocurrency is trading through exchange and mining, which novices sometimes invest in without sufficient knowledge. Therefore, this paper analyzes vulnerabilities of potential cryptocurrency exchanges and individual user wallets. Moreover, this paper will suggest policy risk management methods using international standards such as from NIST and ISO. Blockchain, weaknesses of countermeasures management system, countermeasures to deal with them, management vulnerability of investors and management plan. Server management plan and personal action tips will be provided.
- Published
- 2018
235. Criminal Minds
- Author
-
Junwoo Seo, Moosung Park, Kyungho Lee, Mookyu Park, and Kyoung Min Kim
- Subjects
Impeachment ,Presidential election ,business.industry ,Internet privacy ,Perspective (graphical) ,Sentiment analysis ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,02 engineering and technology ,Space (commercial competition) ,020204 information systems ,Political science ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Suspect ,business ,Cyberspace ,Hacker - Abstract
Recent cyber attacks are affecting the cyberspace as well as the real world, causing social confusion. Russia Scandal in the US presidential election in 2016 is a representative example. This case is being discussed up to the impeachment of the president. Cyber influence attacks are attacks that affect cyberspace to real space. An effectiveness of such attacks boosts when insiders execute. This study analyzed the keywords related to cyber attacks of Russia during the US presidential election in 2016. Based on this, the paper used sentiment analysis for analyzing the psychology of the current Russian Scandal suspect.
- Published
- 2017
236. A study on the priority decision making of IT goals in COBIT 5 goals cascade
- Author
-
Youngin You, Kyungho Lee, and Juhyeon Lee
- Subjects
Process management ,COBIT ,Balanced scorecard ,Computer science ,05 social sciences ,Control (management) ,Analytic hierarchy process ,Context (language use) ,050201 accounting ,02 engineering and technology ,Business model ,The Open Group Architecture Framework ,Information Technology Infrastructure Library ,020204 information systems ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering - Abstract
Nowadays, as IT becomes a key element in most business models, it is very important for countries and corporations to create effective business / IT value from IT-related investments. To do so, the process and structure for business / IT value creation must be designed appropriately for the organization's goals and context. For this, the IT governance models that organizations can use typically include COBIT(Control Objectives for Information and Related Technologies) 5, ITIL (IT Infrastructure Library), and TOGAF (The Open Group Architecture Framework). This research helps to use the COBIT 5 Goals Cascade when companies use COBIT 5 to design processes for business / IT value creation. The COBIT 5 Goals Cascade is a mechanism that translates the needs of stakeholders into actionable and customized enterprise goals, IT-related goals and enabler goals. However, this mechanism does not give priority to what goals should be prioritized. According to the COBIT 5 Enterprise Goals to IT-related Goals Mapping table, multiple IT-related goals must be fulfilled to achieve a single enterprise goal. As a result, the IT-related goals for some enterprise goals will be much larger, confusing which goals should be undertaken. To contribute to this problem, this research presents a prioritized methodology that determines the IT-related goals that are more relevant to the organization's goals in realizing IT-related goals. This prioritization methodology is based on the AHP(Analytic Hierarchy Process) using the 'Balanced Scorecard' and 'Governance Objectives' as indicators.
- Published
- 2017
237. An analysis of economic impact on IoT under GDPR
- Author
-
Kyoung Min Kim, Kyungho Lee, Junwoo Seo, Moosung Park, and Mookyu Park
- Subjects
Computer science ,business.industry ,Data Protection Act 1998 ,Legislation ,Economic impact analysis ,Internet of Things ,business ,Personally identifiable information ,Industrial organization - Abstract
The EU's GDPR is expected to come into force on May 25, 2018. By this regulation, it will be possible to enforce even stronger legislation than the existing Directive. In particular, GDPR is expected to have a major impact on IoT industry, which uses diverse and vast amounts of personal information. This paper first examines why the IoT industry is affected by GDPR. Then, the paper describes how the GDPR will affect the IoT firm's cost qualitatively by using the cost definition of the Gordon and Loeb model and quantitatively by estimating cost using statistics and legal bases. As a qualitative view, the GDPR affected the preventative cost and legal cost of the Gordon and Loeb model, and the quantitative view showed that after the GDPR, the firm's cost could increase by 3 to 4 times on average, and by 18 times if it was more.
- Published
- 2017
238. Cyber situational awareness enhancement with regular expressions and an evaluation methodology
- Author
-
Min Sik Kim, Hyun Kyoo Park, Moosung Park, and Kyungho Lee
- Subjects
Decision support system ,Situation awareness ,Computer science ,Deep packet inspection ,06 humanities and the arts ,02 engineering and technology ,0603 philosophy, ethics and religion ,Computer security ,computer.software_genre ,Cyber operations ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,060301 applied ethics ,Regular expression ,computer - Abstract
Cybersecurity is one of critical issues in modern military operations. In cyber operations, security professionals depend on various information and security systems to mitigate cyber threats through enhanced cyber situational awareness. Cyber situational awareness can give decision makers mission completeness and providing appropriate timely decision support for proactive response. The crucial information for cyber situational awareness can be collected at network boundaries through deep packet inspection with security systems. Regular expression is regarded as a practical method for deep packet inspection that is considering a next generation intrusion detection and prevention, however, it is not commonly used by the reason of its resource intensive characteristics. In this paper, we describe our effort and achievement on regular expression processing capability in real time and an evaluation method with experimental result.
- Published
- 2017
239. Development of Hull Thickness Management System for Ship Management System
- Author
-
Kae-Myoung Park, Kyungho Lee, and Jeong youl Lee
- Subjects
Data platform ,Engineering ,Ship management ,business.industry ,Hull ,Management system ,3d model ,Usability ,Product model ,business ,Maintenance system ,Marine engineering - Abstract
Received 9 January 2015; received in revised form 1 April 2015; accepted 2 April 2015ABSTRACTThe specific goal of the SMS (Ship Management System) is to increate ship safety and decreasemaintenance fee. Equipment of ship is managed by PMS (Planned Management System), sub-system of SMS. But hull has not managed by ship manager. So, the Classes have developed thesystem for hull maintenance. Recently, the ship maintenance system has been developed for sat-isfying operator’s requirements such as managing maintenance data as integrated platform, intui-tive manipulation and design for ease of use. To reflect such requirement, 3D Model basedmaintenance system was introduced for ship in operation stage. Hull items that have to beinspected, repaired, replaced, are stored in integrated data platform with drawing, reports, andetc. and completely linked to 3D product Model. This system is specially developed for mea-surement and maintenance of hull thicknessKey Words: Hull Maintenance, Thickness measurement, Ship Management System, Ship Model
- Published
- 2015
240. Morale enhancing determination model of information security
- Author
-
Kyungho Lee, Kyongwon Kim, and Jong-in Lim
- Subjects
Government ,ComputingMilieux_THECOMPUTINGPROFESSION ,business.industry ,Computer science ,Action plan ,Liability ,Agency (sociology) ,Workload ,Information security ,Marketing ,business ,Working group ,Financial services - Abstract
As the number of recent information security incident occurrenc e increases, more and more workload and liability pressure are given to info-security professionals, which results in decrease of morale level of working groups in the field. In order t o solve this problem, Korean government is providing various acti on plans to improve the morale level of info-security professionals, and also requiring financial companies to submit its own action plan of increasing morale of info-security professionals to Financial Service Agency. For this study, base d on the previous studies and relevant professionals’ interview s, we selected 16 critical morale increase variables, and performed survey for empirical analysis. As a result, 3 features; role, system, and relationship were presented as the main factor of m orale increasement of info-security professionals. This study a lso suggests a decision making method of utilizing the developed mo rale measurement model for individual organizations.Keywords: Info-security professionals, Morale measurement model, Morale increase factors, Model utilization
- Published
- 2015
241. Complete genome sequence and comparative genome analysis of Streptococcus parauberis KCTC11980
- Author
-
Hyun Ja Han, Mun Gyeong Kwon, Dong-Wook Kim, Myoung Ae Park, J. W. Do, Kyungho Lee, Wang Sik Cho, Sung Hee Jung, Myoung Sug Kim, Jung Soo Seo, and Jee Youn Hwang
- Subjects
Genetics ,Whole genome sequencing ,biology ,Phylogenetic tree ,biology.organism_classification ,16S ribosomal RNA ,Streptococcaceae ,Biochemistry ,Genome ,Olive flounder ,Molecular Biology ,Pathogen ,Gene - Abstract
Streptococcus parauberis is recognized as an alpha-hemolytic gram-positive bacterial pathogen associated with bovine udder mastitis. Recently, S. parauberis was identified as the major pathogen of olive flounder (Paralichthys olivaceus) streptococcosis in Northeast Asia, a disease that causes severe economic losses by triggering massive olive flounder mortality. In this study, the complete genome sequence of S. parauberis KCTC11980 was determined and analyzed. S. parauberis KCTC11980 harbors a single chromosome of 2,179,251 bp containing 2281 predicted coding sequences and featuring an average G+C content of 35.65 %. Dot-plot analysis of the entire genomic sequence and phylogenetic analysis of the 16S rRNA gene revealed a close evolutionary relationship between S. parauberis KCTC11980 and S. uberis. Our findings could serve as a basis for understanding the pathogen-host relationship and developing new prophylactic and therapeutic strategies against fish streptococcosis. This study also enhances our understanding of the physiology and evolution of a key representative of the Streptococcaceae family.
- Published
- 2015
242. A Study on Improvement of Effectiveness Using Anomaly Analysis rule modification in Electronic Finance Trading
- Author
-
Kyungho Lee and Eui-soon Choi
- Subjects
Computer science ,Fraudulent transaction ,Online transaction processing ,Anomaly detection ,Electronic finance ,Anomaly (physics) ,Computer security ,computer.software_genre ,Database transaction ,computer ,Type I and type II errors - Abstract
This paper proposes new methods and examples for improving fraud detection rules based on banking customer`s transaction behaviors focused on anomaly detection method. This study investigates real example that FDS(Fraud Detection System) regards fraudulent transaction as legitimate transaction and figures out fraudulent types and transaction patterns. To understanding the cases that FDS regard legitimate transaction as fraudulent transaction, it investigates all transactions that requied additional authentications or outbound call. We infered additional facts to refine detection rules in progress of outbound calling and applied to existing detection rules to improve. The main results of this study is the following: (a) Type I error is decreased (b) Type II errors are also decreased. The major contribution of this paper is the improvement of effectiveness in detecting fraudulent transaction using transaction behaviors and providing a continuous method that elevate fraud detection rules.
- Published
- 2015
243. A Comparative Study on Reforming the Resident Registration Number
- Author
-
Seon-Ju Kim and Kyungho Lee
- Subjects
Multimedia ,Computer science ,Personal identification number ,computer.software_genre ,computer - Published
- 2015
244. A Study on Personal Information Protection Management Assessment Method by DEA
- Author
-
Myeong-soo Jeong and Kyungho Lee
- Subjects
Group information management ,Government ,Knowledge management ,Computer science ,business.industry ,Scale (social sciences) ,Privacy policy ,Management system ,Personal knowledge management ,Personal information management ,business ,Personally identifiable information - Abstract
Recently, with the growing number of services using personal information, government offices` tasks have become more dependent to personal information. Various policies and systems have been made and managed for the safe use of personal information in the circumstances that inevitably require the use of personal information, but the personal information privacy incidents and their scale are on a constant increase. Thus, Korea has been implementing personal information protection management system since 2008 to examine whether public organizations observe the personal information protection act and to how well they manage the personal information, and to improve what is insufficient in the process. However, despite high scores of the outcomes of the system, questions about the effectiveness of the outcomes and about the actual manage level are being raised. Thus, this study seeks to analyze public organizations` activities to protect personal information and the effectiveness of their foundation efforts for them by using the DEA model, and to propose a new model to enhance the effectiveness of the outcomes of personal information protection management system by reflecting them into the outcomes of system, using the derived effectiveness.
- Published
- 2015
245. Revisiting hydrogen spillover in Pt/LTA: Effects of physical diluents having different acid site distributions
- Author
-
Kyungho Lee, Minkee Choi, Ju Hwan Im, Songhyun Lee, and Hyungjun Kim
- Subjects
Hydrogen ,Inorganic chemistry ,chemistry.chemical_element ,Diluent ,Catalysis ,Dilution ,Metal ,chemistry.chemical_compound ,chemistry ,visual_art ,visual_art.visual_art_medium ,Lewis acids and bases ,Physical and Theoretical Chemistry ,Hydrogen spillover ,Benzene - Abstract
Historically, Pt/LTA (e.g., Pt/NaA) has often been used as a model catalyst for studying the catalytic functions of hydrogen spillover (H spillover). Notably, none of the works reported appreciable catalytic activities for Pt/LTA alone, while markedly enhanced activities were reported after physical dilution with some acidic oxides. It was often speculated without experimental evidence that activated hydrogen generated from Pt/LTA can migrate to the diluents surface (“inter-particular” H spillover) where organic reactants can react with spilt-over hydrogen. In this work, we carefully studied benzene hydrogenation activities of Pt/NaA and its decationized form (Pt/HA), before and after the physical dilution with various metal oxides possessing different Lewis and Bronsted acidity. The originally negligible activity of Pt/NaA increased significantly after mixing with various acidic oxides. The physical dilutions, however, resulted in a significant alteration of Pt/NaA structure due to solid-state H+ exchange, which made the catalytic interpretation vague. In contrast, Pt/HA structure did not change after the dilutions, and thus could be used as an ideal catalytic model system for studying inter-particular H spillover. The catalytic results showed that Al-rich metal oxides with abundant Lewis acid sites are effective for enhancing the catalytic activity.
- Published
- 2015
246. A Study on Information Access Control Policy Based on Risk Level of Security Incidents about IT Human Resources in Financial Institutions
- Author
-
Kyungho Lee and Jae-Yoon Sim
- Subjects
Finance ,IT risk ,Computer science ,business.industry ,Role-based access control ,Information access ,Position (finance) ,Access control ,Information security ,Risk factor (computing) ,business ,Personally identifiable information - Abstract
The financial industry in South Korea has witnessed a paradigm shift from selling traditional loan/deposit products to diversified consumption channels and financial products. Consequently, personification of financial services has accelerated and the value of finance-related personal information has risen rapidly. As seen in the 2014 card company information leakage incident, most of major finance-related information leakage incidents are caused by personnel with authorized access to certain data. Therefore, it is strongly required to confirm whether there are problems in the existing access control policy for personnel who can access a great deal of data, and to complement access control policy by considering risk factors of information security. In this paper, based on information of IT personnel with access to sensitive finance-related data such as job, position, sensitivity of accessible data and on a survey result, we will analyze influence factors for personnel risk measurement and apply data access control policy reflecting the analysis result to an actual case so as to introduce measures to minimize IT personnel risk in financial companies.
- Published
- 2015
247. Roles of Tsp66E and Tsp74F in border cell migration and the maintenance of border cell adhesion in Drosophila
- Author
-
Kyoung Sang Cho, Haemin Jeong, Myeongcheol Shin, Kyungho Lee, Minjung Lee, Seung Yeop Han, Youngjae Jeon, and Soojin Lee
- Subjects
biology ,Integrin ,Cell migration ,Adhesion ,Biochemistry ,Cell biology ,Tetraspanin ,Border cells ,Genetics ,biology.protein ,Metastasis suppressor ,CD82 ,Cell adhesion ,Molecular Biology - Abstract
KAI1/CD82, a member of the tetraspanin superfamily, is a tumor metastasis suppressor implicated in cell migration and adhesion in various tumor cells. Drosophila expresses an orthologue of KAI1/CD82, Tsp66E. However, the role of Tsp66E in cell migration and adhesion has not been studied. Here, we investigated the roles of Tsp66E in border cell migration and border cell adhesion, which are well-established in vivo models of cell migration and adhesion. Border cell migration was accelerated by loss of Tsp66E but delayed by Tsp66E overexpression. Deficiency of Tsp74F, a Drosophila orthologue of human Tspan11 and CD151, further increased the migration rate of Tsp66E mutant border cells. In addition, the premature detachment of border cells at stage 8 oogenesis induced by the loss of inflated, which encodes αPS2 integrin, was enhanced by Tsp66E deficiency. Interestingly, Tsp74F deficiency further enhanced the phenotype. αPS2 and βPS integrins were highly expressed in anterior follicle cells before border cell migration, consistent with an important role in border cell adhesion. The results suggest that Tsp66E and Tsp74F cooperate to negatively regulate border cell migration, support the integrin-mediated maintenance of border cell adhesion, and prevent premature migration.
- Published
- 2015
248. Performance and Emission Characteristics of GHP Engine at Different Natural Gas Heating Value
- Author
-
Byungdae Lee, Kyungho Lee, Joong-Seong Lee, Euikwang Choi, Jeonghwan Choi, and Hyunseok You
- Subjects
Natural gas ,business.industry ,Nuclear engineering ,Gas engine ,Environmental science ,Heat of combustion ,business - Published
- 2015
249. Study on Disaster Recovery Efficiency of Terminal PC in Financial Company
- Author
-
Joon-Seob Yoon, Kyungho Lee, and Seung-Chul Yi
- Subjects
Finance ,Computer science ,business.industry ,Event (computing) ,Volume (computing) ,Disaster recovery ,Computer security ,computer.software_genre ,Business continuity ,Terminal (electronics) ,Data_FILES ,Cyber-attack ,business ,computer - Abstract
Financial companies have invested a lot in their disaster recov ery system and exercised training more than once a year to comply related laws and regulations. But massive PCs(Personal C omputers) became disrupted simultaneously and it took a lot of time to recover massive PCs concurrently when March 20 cyber attack occurred. So, it was impossible to meet the tartgeted business continuity level. It was because the importance of PC recovery was neglected compared to other disaster recovery areas.This study suggests the measure to recover massive branch termi nal PCs of financial companies simultaneously in cost-effective way utilizing the existing technology and tests recovery time. It means that in the event of disaster financial companies could recover branch terminal PCs in 3 hours which is recommended recovery time by regulatory body. Other financial companies operating similar type and volume of branches would refer to the recovery structure and method proposed by this study.Keywords: Terminal, PC, desktop, disaster, recovery, cyber attack, malco de, APT, BCP, DRP
- Published
- 2015
250. A Study on Decision Making Process of System Access Management
- Author
-
Young-Seok Cho, Jong-In Im, and Kyungho Lee
- Subjects
Information security audit ,Information security management ,Certified Information Security Manager ,Computer science ,Standard of Good Practice ,Security management ,Information security ,Computer security ,computer.software_genre ,computer ,Security information and event management ,Threat - Abstract
Recently, the administration and supervision of Information Sec urity Certification and Security Inspection has been enforced but information leakage and security accidents by insiders are increasing consistently. The security accidents by insiders ran to 21% in 2010, by the 2011 Cyber Security Watch Survey. The probl em is that immediate recognition is difficult and stopgap measure is mostly adopted without company’s external notice app rehensive for cost increase or credit drop in case of internal security accidents. In the paper, we conducted the regression s tudy on security access management then proposed the standard process available for other systems and businesses sites. It ca n be very useful for many companies to investigate, analyze and improve the problem of security management conveniently. Keywords: Security Management, Regression Study I.서 론 † 최근 2011 Cyber Security Watch Survey [1]에 의하면 2010년 한 해 동안 발생한 보안사고 중 21%가 내부자에 의해 발생한 것이라고 밝혔다. 오늘날 내부자의 침입 행위는 네트워크 및 기반시설 보안
- Published
- 2015
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.