• Title/Summary/Keyword: 사이버대학교

Search Result 1,151, Processing Time 0.028 seconds

Implementation of a Webtoon Transaction and Profit Distribution System using NFT. (NFT 를 활용한 웹툰 거래 및 수익분배 시스템 구현)

  • Lee, Su-Jin;Lee, Hye-Seung;Lee, Hee-Yeon;Cho, Eun-Min
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.341-343
    • /
    • 2021
  • 현재 웹툰 시장이 크게 성장하고 있는 가운데, 과도한 매출 수수료 및 불공정 계약 등 부조리한 수익분배 문제가 불거지고 있다. 본 논문은 웹툰 플랫폼의 수익모델을 보완하는 NFT 기반 웹툰거래 및 수익분배 시스템을 소개하고자 한다. NFT 는 고유한 값을 가진 토큰으로, 디지털 자산에 대한 소유권 인증에 용이하며 블록체인 네트워크 상에서 구매 이력 등의 데이터 위변조가 어렵다는 특징이 있다. 또한 암호화폐처럼 손쉽게 거래할 수 있고 재판매가 가능하다는 장점 때문에 예술 분야에서 각광받고 있다. 이에 웹툰에 NFT 를 발행하여 웹툰을 소장 및 거래하고, NFT 소장 비율에 따라 해당 웹툰의 열람 수익을 나눠 가질 수 있는 시스템을 개발하여 제안한다.

사이버대학교와 학습자의 지리적 분포 및 교육 특성에 관한 연구

  • 김은경
    • Proceedings of the KGS Conference
    • /
    • 2002.11a
    • /
    • pp.65-67
    • /
    • 2002
  • 정보통신의 발달에 따라 변화된 생활양식은 사람들을 걸어 다니면서 직접 구매하던 쇼핑방식에서 전자상거래로, 은행창구에서 번호표를 뽑고 기다리며 업무를 보았던 은행업무를 사이버 뱅킹으로 대체하게 하였다. 이렇듯 정보통신의 발달은 시간과 공간의 제약을 뛰어넘어 새로운 개념의 사회공간을 형성하게 되었고, 특히 주목할 점으로 최근에 등장한 사이버교육 공간을 들 수 있다.(중략)

  • PDF

무기체계 사이버 보안 정책 동향

  • Lee, Jeong Kyu
    • Review of KIISC
    • /
    • v.28 no.6
    • /
    • pp.83-87
    • /
    • 2018
  • 무기체계를 대상으로 한 다양한 형태의 사이버 위협에 직면하고 있다. 실제 상대국을 대상으로 한 공격행위도 언론을 통해 발표되고 있다. 무기체계를 대상으로 한 사이버 공격은 실물 공격보다도 더 큰 위력을 발휘하기 때문에 이를 대비하기 위한 보안 검증 강화는 그 무엇보다도 중요하다고 할 수 있다. 본 고에서는 이러한 사이버 위협, 미국과 우리의 보안정책을 알아보고 문제점을 진단하여 현실적 개선방향을 제시하고자 한다.

Preparation and Configuration Method to Enhance Cyber Resilience (사이버 복원력 강화를 위한 준비 및 구성방안)

  • Sunoh Choi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.190-192
    • /
    • 2023
  • 카카오 데이터 센터 화재 사건이나 콜로니얼 파이프라인 해킹 사건과 같이 시스템에 대한 다양한 공격이나 사고가 발생하고 이로 인하여 중요한 필수 서비스가 중단되는 문제가 발생하고 있다. 이러한 문제를 해결하기 위하여 사이버 복원력이 관심을 받고 있다. 사이버 복원력은 사이버 보안에 추가해서 예측, 내구, 회복, 적응의 목적을 가진다. 이 논문에서는 사이버 복원력이 무엇인지 소개하고 사이버 복원력을 기술적인 관점에서와 제도적인 관점에서 소개한다.

A study on the relationship between gaze guidance and cybersickness using Eyetracking (시선 추적기법을 활용한 시선 유도와 사이버 멀미 관계 연구)

  • Lee, TaeGu;Ahn, ChanJe
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.167-173
    • /
    • 2022
  • The size of the virtual reality market is growing every year, but cybersickness that occurs in virtual reality has not been resolved yet. In this paper, results were derived through experiments on the relationship between cybersickness and gaze guidance occurring in virtual reality contents. Using eye tracking technique, the relationship of gaze movement with cybersickness was identified. The experiment was divided into two groups to find out whether visual induction affects cyber sickness. In addition, the results were analyzed by dividing the two groups to check whether cyber sickness showed different results according to gender. We also analyzed using the SSQ questionnaire to measure cybersickness. We tried to understand the relationship between gaze guidance and cybersickness through two methods. As a result of the experiment, it was found that the induction of a clear gaze caused the concentration of the gaze, and it was effective in cybersickness through the rotation of the camera. In order to alleviate cyber sickness, it has been confirmed that concentrating one's eyes through gaze-guided production is effective for cyber sickness. It is hoped that this result will be used as a way to alleviate cyber sickness for producers who want to use virtual reality to produce content.

Analysis of Cyber Crime and Its Characteristics (사이버범죄 유형별 특징 분석 연구)

  • So-Hyun Lee;Ilwoong Kang;Yoonhyuk Jung;Hee-Woong Kim
    • Information Systems Review
    • /
    • v.21 no.3
    • /
    • pp.1-26
    • /
    • 2019
  • Now we are facing with a possibility of having crimes, which have been only possible offline, in cyber spaces as well.Especially, a recent growth in the use of SNS, promoted by popularization of smart phones, also has led an abrupt increase in cyber crime. It would be important to have a understanding of cyber crime and its characteristics by type as well as factors associated with each type of cyber crime in order to devise appropriate preventive measures against cyber crime. However, most of the previous studies on cyber crimesolely made through literature review or indirect approaches. Therefore, this study has been designed to conduct the interview with actual suspects(criminals) of cyber crime to address factors of cyber crime and to devise specific preventive measures and countermeasures against cyber crime. Especially, among various types of cyber crime, this study aims at addressing the 'trades' and 'financial transaction' of crimes committed using the information and communication network and the 'cyber libel/insult'of crimes committed using unlicensed contents, which have been soared recently and become significant issues. The findings of this study could be beneficial for the society since it has managed to conduct the interview and reveal relationships among major factors of cyber crime. The findings of this study could be used for devising and developing proper preventive and countermeasures against cyber crime, in turn reducing and preventing its damage.

Motion Sickness Measurement and Analysis in Virtual Reality using Deep Neural Networks Algorithm (심층신경망 알고리즘을 이용한 가상환경에서의 멀미 측정 및 분석)

  • Jeong, Daekyo;Yoo, Sangbong;Jang, Yun
    • Journal of the Korea Computer Graphics Society
    • /
    • v.25 no.1
    • /
    • pp.23-32
    • /
    • 2019
  • Cybersickness is a symptom of dizziness that occurs while experiencing Virtual Reality (VR) technology and it is presumed to occur mainly by crosstalk between the sensory and cognitive systems. However, since the sensory and cognitive systems cannot be measured objectively, it is difficult to measure cybersickness. Therefore, methodologies for measuring cybersickness have been studied in various ways. Traditional studies have collected answers to questionnaires or analyzed EEG data using machine learning algorithms. However, the system relying on the questionnaires lacks objectivity, and it is difficult to obtain highly accurate measurements with the machine learning algorithms. In this work, we apply Deep Neural Network (DNN) deep learning algorithm for objective cybersickness measurement from EEG data. We also propose a data preprocessing for learning and network structures allowing us to achieve high performance when learning EEG data with the deep learning algorithms. Our approach provides cybersickness measurement with an accuracy up to 98.88%. Besides, we analyze video characteristics where cybersickness occurs by examining the video segments causing cybersickness in the experiments. We discover that cybersickness happens even in unusually persistent changes in the darkness such as the light in a room keeps switching on and off.

A Study on Relationship between Media Environment and Adolescent Cyber-Delinquency : Focused on X-rated Media Commitment (매체환경과 청소년 사이버비행과의 관계에 대한 연구 : 성인매체몰입을 중심으로)

  • Lee, Chang-Moon;Moon, Jin-Young;Park, Ju-Won
    • Journal of Digital Convergence
    • /
    • v.17 no.4
    • /
    • pp.365-379
    • /
    • 2019
  • The purpose of this study is to investigate what factors affect cyber-delinquency after examining the previous research focusing on the general strain theory and the delinquency opportunity theory in the existing studies. And as adolescents move from middle school to high school, this study is intended to analyze what factors affect cyber-delinquency from a longitudinal perspective using KCYPS(Korea Child and Youth Panel Survey) elementary 4th grade fourth and seventh data. The adolescence cyber-delinquency probability of occurrence were analyzed through the panel logit fixed-effect model using STATA. And then the cyber-delinquency frequency of adolescents were analyzed through the panel tobit random-effect model. As a result of analyzing the factors affecting cyber-delinquency frequency, Adult media commitment, computer use time, and cell phone dependency increased cyber-delinquency frequency. On the other hand, among the parenting attitudes, the attitude of supervising attentively and adolescents' age-increasing decreased cyber-delinquency frequency.

A Study on Mechanism of Intelligent Cyber Attack Path Analysis (지능형 사이버 공격 경로 분석 방법에 관한 연구)

  • Kim, Nam-Uk;Lee, Dong-Gyu;Eom, Jung-Ho
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.93-100
    • /
    • 2021
  • Damage caused by intelligent cyber attacks not only disrupts system operations and leaks information, but also entails massive economic damage. Recently, cyber attacks have a distinct goal and use advanced attack tools and techniques to accurately infiltrate the target. In order to minimize the damage caused by such an intelligent cyber attack, it is necessary to block the cyber attack at the beginning or during the attack to prevent it from invading the target's core system. Recently, technologies for predicting cyber attack paths and analyzing risk level of cyber attack using big data or artificial intelligence technologies are being studied. In this paper, a cyber attack path analysis method using attack tree and RFI is proposed as a basic algorithm for the development of an automated cyber attack path prediction system. The attack path is visualized using the attack tree, and the priority of the path that can move to the next step is determined using the RFI technique in each attack step. Based on the proposed mechanism, it can contribute to the development of an automated cyber attack path prediction system using big data and deep learning technology.

A Study on the Quantitative Threat-Level Assessment Measure Using Fuzzy Inference (퍼지추론을 이용한 정량적 사이버 위협 수준 평가방안 연구)

  • Lee, Kwang-ho;Kim, Jong-Hwa;Kim, Jee-won;Yun, Seok Jun;Kim, Wanju;Jung, Chan-gi
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.19-24
    • /
    • 2018
  • In this study, for evaluating the cyber threat, we presented a quantitative assessment measures of the threat-level with multiple factors. The model presented in the study is a compound model with the 4 factors; the attack method, the actor, the strength according to the type of the threat, and the proximity to the target. And the threat-level can be quantitatively evaluated with the Fuzzy Inference. The model will take the information in natural language and present the threat-level with quantified data. Therefore an organization can accurately evaluate the cyber threat-level and take it into account for judging threat.

  • PDF