• Title/Summary/Keyword: threat to face

Search Result 61, Processing Time 0.027 seconds

Doing More by Seeing Less: Gritty Applicants are Less Sensitive to Facial Threat Cues

  • Shin, Ji-eun;Lee, Hyeonju
    • Science of Emotion and Sensibility
    • /
    • v.25 no.1
    • /
    • pp.21-28
    • /
    • 2022
  • People differ greatly in their capacity to persist in the face of challenges. Despite significant research, relatively little is known about cognitive factors that might be involved in perseverance. Building upon human threat-management mechanism, we predicted that perseverant people would be characterized by reduced sensitivity (i.e., longer detection latency) to threat cues. Our data from 5,898 job applicants showed that highly perseverant individuals required more time to correctly identify anger in faces, regardless of stimulus type (dynamic or static computer-morphed faces). Such individual differences were not observed in response to other facial expressions (happiness, sadness), and the effect was independent of gender, dispositional anxiety, or conscientiousness. Discussions were centered on the potential role of threat sensitivity in effortful pursuit of goals.

Face Detection Using Multi-level Features for Privacy Protection in Large-scale Surveillance Video (대규모 비디오 감시 환경에서 프라이버시 보호를 위한 다중 레벨 특징 기반 얼굴검출 방법에 관한 연구)

  • Lee, Seung Ho;Moon, Jung Ik;Kim, Hyung-Il;Ro, Yong Man
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.11
    • /
    • pp.1268-1280
    • /
    • 2015
  • In video surveillance system, the exposure of a person's face is a serious threat to personal privacy. To protect the personal privacy in large amount of videos, an automatic face detection method is required to locate and mask the person's face. However, in real-world surveillance videos, the effectiveness of existing face detection methods could deteriorate due to large variations in facial appearance (e.g., facial pose, illumination etc.) or degraded face (e.g., occluded face, low-resolution face etc.). This paper proposes a new face detection method based on multi-level facial features. In a video frame, different kinds of spatial features are independently extracted, and analyzed, which could complement each other in the aforementioned challenges. Temporal domain analysis is also exploited to consolidate the proposed method. Experimental results show that, compared to competing methods, the proposed method is able to achieve very high recall rates while maintaining acceptable precision rates.

Japanese Political Interviews: The Integration of Conversation Analysis and Facial Expression Analysis

  • Kinoshita, Ken
    • Asian Journal for Public Opinion Research
    • /
    • v.8 no.3
    • /
    • pp.180-196
    • /
    • 2020
  • This paper considers Japanese political interviews to integrate conversation and facial expression analysis. The behaviors of political leaders will be disclosed by analyzing questions and responses by using the turn-taking system in conversation analysis. Additionally, audiences who cannot understand verbal expressions alone will understand the psychology of political leaders by analyzing their facial expressions. Integral analyses promote understanding of the types of facial and verbal expressions of politicians and their effect on public opinion. Politicians have unique techniques to convince people. If people do not know these techniques and ways of various expressions, they will become confused, and politics may fall into populism as a result. To avoid this, a complete understanding of verbal and non-verbal behaviors is needed. This paper presents two analyses. The first analysis is a qualitative analysis that deals with Prime Minister Shinzō Abe and shows that differences between words and happy facial expressions occur. That result indicates that Abe expresses disgusted facial expressions when faced with the same question from an interviewer. The second is a quantitative multiple regression analysis where the dependent variables are six facial expressions: happy, sad, angry, surprised, scared, and disgusted. The independent variable is when politicians have a threat to face. Political interviews that directly inform audiences are used as a tool by politicians. Those interviews play an important role in modelling public opinion. The audience watches political interviews, and these mold support to the party. Watching political interviews contributes to the decision to support the political party when they vote in a coming election.

Some suggestions for teaching Chinese speaking from the pragmatic perspective: Focused on directives in the Chinese textbooks (중국어 말하기 교육을 위한 몇 가지 화용론적 제언 - 교재 속 지시화행 분석을 중심으로)

  • Park, Chan Wook
    • Cross-Cultural Studies
    • /
    • v.27
    • /
    • pp.435-470
    • /
    • 2012
  • This paper aims to examine directives and its adjacency pair directives-responses in the Chinese textbook Hanyu Kouyu from the speech act theory, and give some suggestions for Chinese speaking instruction. For analysis of directives, it is important to consider context surrounding it at first. Context includes space for speaking, person who speak with, adjacent speech act, etc., so this paper considers context firstly before explaining directives and discusses how each element of context effects interpretation of its meaning. From the politeness perspective, directives and rejection as one of the responses are easy to be FTAs(face-threatening acts) fundamentally, so they are required to have some strategies for minimizing the threat, and it is found that there are strategies for positive face and negative face in the textbook. In the textbook, it is also examined that directives-responses contribute for interlocutor to accomplish social acts, for example, negotiating, insisting, maintaining, making alternative ideas, etc.

Forecasting non-traditional security threats in Korea :by Republic of Korea Army collective intelligence platform operating result (미래 한반도의 비전통적 안보위협 예측 :육군의 집단지성 플랫폼 운영 결과를 중심으로)

  • Cho, Sang Keun;Jung, Min-Sub;Moon, Sang Jun;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.216-222
    • /
    • 2021
  • COVID-19 pandemic brings attentions to the nonmilitary and transnational non-traditonal security threats, as the scales of such damage by these threats are beyond expectation. The Republic of Korea Army tries to forecast non-traditional security threat which may be occurred in Korean peninsula by using collective intelligence platform. In coming years, climate change, social changes and technology development caused by the 4th industrial revolution will diversify non-traditional security threat. Considering urbanization, internet distribution rate, and geopolitical location where atmosphere from continent and ocean meet, Korea would may face the most lethal ones compared to those of other countries may face. Therefore, to predict such threats in pangovernment scale using collective intelligence platforms which embrace civil, public, military, industry, academy and research center is the most important than anything.

A Survey of Parents Perceptions of Home Exercise Program for Children with Disabilities Caused by COVID-19 (COVID-19로 인한 장애 아동의 가정운동 프로그램에 관한 부모들의 인식 조사)

  • Park, Cheol-Man;Kim, Myung-Chul
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.9 no.4
    • /
    • pp.225-235
    • /
    • 2021
  • Purpose: Since coronavirus disease 2019 (COVID-19) spread around the world, non-face-to-face services have emerged as the new normal. The functioning of children with developmental disabilities and cerebral palsy improves when parents, therapists, and institutions cooperate. We aimed to investigate the difficult environment of pediatric physical therapy caused by COVID-19, and grasp parents' perceptions of home exercise programs. We intend to design home exercise programs for pediatric treatment in the future and create a non-face-to-face pediatric rehabilitation service system based on our findings. Methods: The first survey was conducted on 30 parents who had children with cerebral palsy and developmental disabilities. It was produced after consultation with relevant experts and discussion with the research team, based on a survey conducted in a previous study. The second survey was produced by revising and supplementing the opinions of parents who completed the first survey and consulting experts. Thereafter, an online survey was conducted on 118 parents who had children with cerebral palsy and developmental disabilities. Results: 61.01 % of the parents reported that they were anxious or afraid for their children to be treated for infectious diseases. 83.90 % of the parents reported that the role of parents had increased. 50.00 % of the parents complained of a lack of skill. 85.59 % of the parents reported that they needed a home exercise program provided by the organization. As a non-face-to-face exercise management method, 35.59 % of the parents wanted a real-time video recording electronically mailed to them, and 34.75 % wanted real-time education using video conferencing programs such as zoom. Conclusion: The threat of COVID-19 has further emphasized the importance of social cooperation and management, leading organizations to enter a new era of non-face-to-face rehabilitation services. It is necessary to collect and systematize related studies to reflect more diverse opinions and improve the perceptions of therapists and parents.

The Operational Time pressure and TEM (운항시간 압력 및 Threat과 Error 관리)

  • Choe, Jin-Guk;An, Gyeong-Su;Jeong, Won-Gyeong;Kim, Chil-Yeong
    • 한국항공운항학회:학술대회논문집
    • /
    • 2006.11a
    • /
    • pp.61-65
    • /
    • 2006
  • The flight deck crew are under the operational time pressure in the cockpit. The crew tend to make errors when they face the threats of operational time pressure because they are in a rush. The flight deck crew can reduce threats and errors which existing within the airlines by using threat and error management when the crew know these threats and errors. The airlines can implement meaningful safety management system by analyzing into the useful information for to identify the hazard and manage the risk to reduce these threats and errors since aircrafts accidents can be fatal.With the threats and errors that were found regard to operational time pressures, company may implements safety change process to improve the safety systematically and the crew can manage the threats and errors more effectively.

  • PDF

Behavioral Analysis Zero-Trust Architecture Relying on Adaptive Multifactor and Threat Determination

  • Chit-Jie Chew;Po-Yao Wang;Jung-San Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2529-2549
    • /
    • 2023
  • For effectively lowering down the risk of cyber threating, the zero-trust architecture (ZTA) has been gradually deployed to the fields of smart city, Internet of Things, and cloud computing. The main concept of ZTA is to maintain a distrustful attitude towards all devices, identities, and communication requests, which only offering the minimum access and validity. Unfortunately, adopting the most secure and complex multifactor authentication has brought enterprise and employee a troublesome and unfriendly burden. Thus, authors aim to incorporate machine learning technology to build an employee behavior analysis ZTA. The new framework is characterized by the ability of adjusting the difficulty of identity verification through the user behavioral patterns and the risk degree of the resource. In particular, three key factors, including one-time password, face feature, and authorization code, have been applied to design the adaptive multifactor continuous authentication system. Simulations have demonstrated that the new work can eliminate the necessity of maintaining a heavy authentication and ensure an employee-friendly experience.

Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System

  • Khosravy, Mahdi;Nakamura, Kazuaki;Hirose, Yuki;Nitta, Naoko;Babaguchi, Noboru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.1100-1118
    • /
    • 2021
  • In a wide range of ML applications, the training data contains privacy-sensitive information that should be kept secure. Training the ML systems by privacy-sensitive data makes the ML model inherent to the data. As the structure of the model has been fine-tuned by training data, the model can be abused for accessing the data by the estimation in a reverse process called model inversion attack (MIA). Although, MIA has been applied to shallow neural network models of recognizers in literature and its threat in privacy violation has been approved, in the case of a deep learning (DL) model, its efficiency was under question. It was due to the complexity of a DL model structure, big number of DL model parameters, the huge size of training data, big number of registered users to a DL model and thereof big number of class labels. This research work first analyses the possibility of MIA on a deep learning model of a recognition system, namely a face recognizer. Second, despite the conventional MIA under the white box scenario of having partial access to the users' non-sensitive information in addition to the model structure, the MIA is implemented on a deep face recognition system by just having the model structure and parameters but not any user information. In this aspect, it is under a semi-white box scenario or in other words a gray-box scenario. The experimental results in targeting five registered users of a CNN-based face recognition system approve the possibility of regeneration of users' face images even for a deep model by MIA under a gray box scenario. Although, for some images the evaluation recognition score is low and the generated images are not easily recognizable, but for some other images the score is high and facial features of the targeted identities are observable. The objective and subjective evaluations demonstrate that privacy cyber-attack by MIA on a deep recognition system not only is feasible but also is a serious threat with increasing alert state in the future as there is considerable potential for integration more advanced ML techniques to MIA.

A Method of Device Validation Using SVDD-Based Anormaly Detection Technology in SDP Environment (SDP 환경에서 SVDD 기반 이상행위 탐지 기술을 이용한 디바이스 유효성 검증 방안)

  • Lee, Heewoong;Hong, Dowon;Nam, Kihyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1181-1191
    • /
    • 2021
  • The pandemic has rapidly developed a non-face-to-face environment. However, the sudden transition to a non-face-to-face environment has led to new security issues in various areas. One of the new security issues is the security threat of insiders, and the zero trust security model is drawing attention again as a technology to defend against it.. Software Defined Perimeter (SDP) technology consists of various security factors, of which device validation is a technology that can realize zerotrust by monitoring insider usage behavior. But the current SDP specification does not provide a technology that can perform device validation.. Therefore, this paper proposes a device validation technology using SVDD-based abnormal behavior detection technology through user behavior monitoring in an SDP environment and presents a way to perform the device validation technology in the SDP environment by conducting performance evaluation.