• Title/Summary/Keyword: 사이버정치

Search Result 53, Processing Time 0.024 seconds

A Study on Electronic Payment System for enable Mobile Commerce (Mobile Commerce 활성화를 위한 전자지불시스템에 관한 탐색적 연구)

  • 김지현;이국철
    • Proceedings of the Korea Database Society Conference
    • /
    • 2000.11a
    • /
    • pp.173-185
    • /
    • 2000
  • 개인용 컴퓨터와 인터넷의 폭발적인 보급과 발전은 전자상거래와 E-business로 요약 되는 지식과 정보에 기반을 둔 비즈니스의 변화, 정보 공유를 통한 사이버 세계의 활성화, 언론이나 방송 등을 대체할 새로운 미디어로서의 역할 등 경제적, 문화적, 정치적 관점에서 인간의 삶에 혁신적 변화를 가져왔다. (중략)

  • PDF

A Study on the Concept of the Cyber Warfare and the Plan of Reaction (사이버전의 개념과 대응방안에 관한 연구)

  • Park, Chan-soo;Park, Yongsuk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.521-524
    • /
    • 2014
  • Because of the development of computers and networks, the use of the internet has been rapidly increased. The smart devices, such as smart phones and tablet PCs, have made an epoch-making changes, which have brought people's daily lives to the cyber world and life values have been improved. The cyber world not only just changed individual's lives, but also affected all areas and the world. The recent global trends reside mainly in protection of energy sources, and nation's dependency of the information system such as politic, economic and national security. Since major national infrastructure becomes a stragic attack target, the importance of cyber warfare has rised as an effective way to attact enermy. This article explores the concept of cyber warfare and national cyber capability, and then figure out the plan of reaction to minimize damages with best protection when cyber warfare occurs.

  • PDF

Encounter Measure System Against Cyber-Terror And Legalism (사이버테러 대응체제와 법치주의)

  • Jeong, Jun-hyeon;Kim, Kui-nahm
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.83-90
    • /
    • 2004
  • Preventive measures and control over cyber terrorism in Korea is a complex problem. Today laws should meet requirements made by modern technologies development, Law enforcement, special services and judicial system cooperation, their efforts coordination and their material security are priority directions, None of the country is able to prevent cyber terror independently and international cooperation in this field is vital. Taking the above into consideration, we propose and inisit that National Intelligence Service(NIS) should share cyber terror data with Police Agency and have top police authority over the cyber terror.

  • PDF

A Study on Discriminant Factors of Political Orientation of Korean People: Focusing upon Welfare Attitudes (한국인의 정치적 성향 판별요인 분석: 복지태도를 중심으로)

  • Sin-Young Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.227-231
    • /
    • 2024
  • This study purports to examine the potential effects of welfare attitudes of Korean people upon their political orientation. The 17th Korea Welfare Panel Data(KWPD) in 2022 are used for this purpose. Independent variable include sex, age, education, interest in politics, and employment status. Discriminant analysis show several results. First and foremost, pre-established discriminant function works well for classification of respondents' liberal vs conservative stance. Secondly, except gender and dummy variable for temporary employed, all independent variables contribute significantly for the classification at a given significance level. . Finally, welfare attitudes of respondents', measured by universalism vs selectivism and the attitudes upon increasing tax for welfare expenditures are found to be significant and relatively big impacts upon dependent variable, compard to other variables in the model. The nature of causal relationship between welfare attitudes and political orientation remains for further study.

Comparative Study of US-China Discourse on Cross-border Data Regulation and Cybersecurity: Focusing on ASEAN Development Assistance Cases (미·중 초국경 데이터 규제와 사이버안보 담론 비교: 아세안 개발원조 사례를 중심으로)

  • Kayeon Lee
    • Informatization Policy
    • /
    • v.30 no.1
    • /
    • pp.89-108
    • /
    • 2023
  • Science, technology and innovation (STI) has expanded the activity of actors from the traditional physical territory to the cyberspace. Data-driven platform services and markets advance new discussions on cross-border cooperation and cyber security, as well as discourse on sovereignty in cyberspace. These changes are also affecting the hegemony competition between the US and China. In particular, competition for aid to developing countries that are located along major resource transportation routes, such as natural gas and deep sea resources, is fierce. ASEAN is not only a geopolitical military and security point where the US and China powers collide, but its population of 600 million has great potential for the development of the digital economy due to its data resources. In this regard, this article aims to connect the discourse of liberalism and authoritarianism with data regulation and cybersecurity in international development cooperation, and derive implications for ASEAN integration through this. This study has significance as a convergence study that links international political issues related to big data in terms of global governance.

Design and Implementation of avatar behaving on Internet Using EAI (EAI를 이용한 인터넷 상에서의 아바타 동작에 관한 설계 및 구현)

  • 정회경;안성옥;정재길
    • The Journal of Information Technology
    • /
    • v.4 no.1
    • /
    • pp.97-108
    • /
    • 2001
  • This thesis is about the design and implementation of the system for controlling Avatar, user's alter ego in a simulated world using the EAI(External Authoring Interface) technology to be able to control VRML(Virtual Reality Modeling Language). In this thesis, user's Avatar described in VRML language embodied interactions to move and show an expression by JAVA according to a user's demand. In the future, this would be able to develop into a research to try to embody and construct a simulated society based on web for the purpose of various integration of society such as cyber government, lecture, trial performance, and auction.

  • PDF

복합 기능을 갖는 정보보호 제품의 보호 프로파일 개발을 위한 평가 방법론 고찰

  • 서대희;이임영;정지훈;채수영
    • Review of KIISC
    • /
    • v.14 no.1
    • /
    • pp.107-122
    • /
    • 2004
  • 세계 각 국은 산업 및 정보의 의존성에 의해 모든 정보를 한눈에 볼 수 있는 시대로 변모하였으며, 사이버 공간 그 자체가 정치, 경제사회, 문화 등의 기본적인 생활 공간으로 자리 매김하고 있다. 따라서 사이버 공간을 보호하지 않을 경우 안정된 정보사회 구축은 불가능하다. 특히, 정보보호의 대상이 특정 국가적인 정보 보안에 국한되지 않고 기업 및 사회의 정보 등으로 확대되고 있어, 국가적으로 국가 안보뿐만 아니라 개인의 정보보호를 위한 새로운 제도와 조치가 절실히 요구되는 시점이다. 따라서 본 고에서는 복합 기능을 갖는 정보보호 제품의 보호 프로파일 개발을 위한 기반 연구로 요구되는 대체 평가 방법론에 대해 고찰해 보고자한다. 특히 북미를 중심으로 표준화가 진행 중에 있는 CEM을 기준으로, 영국을 중심으로 유럽의 적합성 표준으로 추진 중에 있는 SCT와 ISO/IEC에서 제시되고 있는 적합성 테스트 방법론인 ISO/IEC 9496 및 보증 프레임워크인 ISO/IEC 15443에 대한 자체 취약성 분석을 수행하고 자각의 평가 방법론간의 상호 연관성과 비교 분석을 통해 복합 기능을 갖는 정보보호 제품의 보호 프로파일 개발의 가이드라인을 제시하고자 한다.

The Study on System Log Analysis of Malicious Behavior (악성 행위에 대한 시스템 로그 분석에 관한 연구)

  • Kim, EunYoung;Lee, CheolHo;Oh, HyungGeun;Lee, JinSeok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1193-1196
    • /
    • 2004
  • 1980년 후반. MIT에 버너스 리 교수가 인터넷 상에 웹(WWW)을 창시하면서부터 우리의 일상생활은 엄청난 변화를 가져왔다. 시 공간을 초월할 수 있는 인터넷이라는 가상 세계에서는 개인뿐만 아니라 정치 경제 사회등 모든 분야에 걸쳐 인터넷을 통한 쉽고 간편하며 빠른 교류가 이루어짐으로써 이제 더 이상 네트워크를 이용하지 않는 분야는 찾아 볼 수 없을 것이다. 그러나 이러한 현실 속에서 인터넷은 항상 순기능만을 수행하지는 않는다. 특히 악성코드를 이용한 사이버 침해 행위 기술이 인터넷의 발전과 함께 동시에 발전함으로써 이제는 악성코드를 이용한 사이버 침해 행위를 방지하고자하는 노력을 해야할 것이다. 따라서 본 논문에서는 악성코드를 탐지하기 위해 실시간 시스템 모니터링 도구를 이용하여 악성코드가 시스템에 어떠한 침해행위를 행하고, 해당 침해 행위 모니터링 로그 분석을 통해 기존의 알려진 악성코드뿐만 아니라 알려지지 않은 악성코드를 탐지할 수 있는 악성 패턴 분석 및 추출에 초점을 두어 기술하였다.

  • PDF

A Study on the Scope of Protection for Freedom of Expression on Internet: Focused on the Analysis of Judicial Precedents on Cyber Conflicts (인터넷에서 표현의 자유 보호 법리에 관한 연구: 사이버 분쟁에 대한 법원 판례 분석을 중심으로)

  • Yun, Sung-Oak
    • Korean journal of communication and information
    • /
    • v.50
    • /
    • pp.29-49
    • /
    • 2010
  • Various opinions are expressed about the Internet Regulation. Some people argue that it is impossible to control because of the technical characteristics of Internet, while other people argue that it is easy to control. Recently in Korea, a move to reinforce the Internet Regulation through the extension of cyber real-name system is emerging, whereas the concern for its excessive infringement of the Freedom of Expression is increasing. This paper was intended to draw a reasonable direction for Internet Regulation in our society. And accordingly this paper tried to suggest a desirable direction of Internet Control in the future and to draw a criterion for domestic court judgement by analyzing cases of cyber defamation so far. The result of this study proposed that the Freedom for Expression be widely secured in the case of cyber defamation of criticism and political comments upon public officials and that the legitimacy and effectiveness of Internet Regulation be ensured. This result of study is expected to help establish the direction and principle of Internet Regulation in the future around Korea Communications Commission and Korea Communications Standards Commission.

  • PDF

Cyberattack Goal Classification Based on MITRE ATT&CK: CIA Labeling (MITRE ATT&CK 기반 사이버 공격 목표 분류 : CIA 라벨링)

  • Shin, Chan Ho;Choi, Chang-hee
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.15-26
    • /
    • 2022
  • Various subjects are carrying out cyberattacks using a variety of tactics and techniques. Additionally, cyberattacks for political and economic purposes are also being carried out by groups which is sponsored by its nation. To deal with cyberattacks, researchers used to classify the malware family and the subjects of the attack based on malware signature. Unfortunately, attackers can easily masquerade as other group. Also, as the attack varies with subject, techniques, and purpose, it is more effective for defenders to identify the attacker's purpose and goal to respond appropriately. The essential goal of cyberattacks is to threaten the information security of the target assets. Information security is achieved by preserving the confidentiality, integrity, and availability of the assets. In this paper, we relabel the attacker's goal based on MITRE ATT&CK® in the point of CIA triad as well as classifying cyber security reports to verify the labeling method. Experimental results show that the model classified the proposed CIA label with at most 80% probability.