• Title/Summary/Keyword: 사이버 경제

Search Result 215, Processing Time 0.025 seconds

디지털네트워킹시대의 새로운 기업경영전략

  • 강세호
    • Proceedings of the Korea Database Society Conference
    • /
    • 1999.10a
    • /
    • pp.247-255
    • /
    • 1999
  • 디지털화와 연결성으로 특징 지워지는 디지털네트워킹 시대(Digital Networking Era)에 접어들면서 우리 사회는 흔들림과 갈등을 동반하는 급격한 사회변화가 일어나고 있고, 사이버 커뮤니티 형성을 통한 새로운 우주에 대한 적응과 개방문화 형성에 따른 국경 없는 세계경제(Borderless Global Economy)의 질서유지 등이 중요한 이슈로 등장하고 있다. (중략)

  • PDF

A Study on Electronic Payment System for enable Mobile Commerce (Mobile Commerce 활성화를 위한 전자지불시스템에 관한 탐색적 연구)

  • 김지현;이국철
    • Proceedings of the Korea Database Society Conference
    • /
    • 2000.11a
    • /
    • pp.173-185
    • /
    • 2000
  • 개인용 컴퓨터와 인터넷의 폭발적인 보급과 발전은 전자상거래와 E-business로 요약 되는 지식과 정보에 기반을 둔 비즈니스의 변화, 정보 공유를 통한 사이버 세계의 활성화, 언론이나 방송 등을 대체할 새로운 미디어로서의 역할 등 경제적, 문화적, 정치적 관점에서 인간의 삶에 혁신적 변화를 가져왔다. (중략)

  • PDF

Analysis of Influencing Factors of Cyber Weapon System Core Technology Realization Period (사이버 무기체계 핵심기술 실현시기의 영향 요인 분석)

  • Lee, Ho-gyun;Lim, Jong-in;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.281-292
    • /
    • 2017
  • It is demanded to promote research and development of cyber weapons system and core technology in response to the ongoing cyber attack of North Korea. In this paper, core technologies of the future cyber weapon system are developed and the factors affecting the realization timing of core technologies were analyzed. 9 core technology groups and 36 core technologies are derived. Afterwards, these core technology groups are compared to the operation phase of the joint cyber warfare guideline and the cyber kill chain of Lockheed Martin. As a result of the comparison, it is confirmed that the core technology groups cover all phases of the aforementioned tactics. The results of regression analyses performed on the degree of influence by each factor regarding the moment of core technology realization show that the moment of core technology realization approaches more quickly as factors such as technology level of the most advanced country, technology level of South Korea, technology transfer possibility from the military sector to the non-military sector(spin-off factor), and technology transfer possibility from the non-military sector to the military sector(spin-on factor) increase. On the contrary, the moment of core technology realization is delayed as the degree at which the advanced countries keep their core technologies from transferring decrease. The results also confirm that the moment of core technology realization is not significantly correlated to the economic ripple effect factor. This study is meaningful in that it extract core technologies of cyber weapon system in accordance with revision of force development directive and join cyber warfare guideline, which incorporated cyber weapon system into formal weapon system. Furthermore, the study is significant because it indicates the influential factor of the moment of core technology realization.

A Study on the Design of Re-training Courses for Nurturing Cybersecurity Professionals from Other Occupational Groups (타 직업군으로부터의 사이버보안 전문인력으로의 직무전환을 위한 재교육과정 설계 연구)

  • Ji, Juyeon;Park, Sangho;Yu, Harang;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.43-60
    • /
    • 2018
  • Recently, with the arrival of the 4th industrial revolution, the security risks are converging and complexly changing, and the demand of cybersecurity experts is increasing. Therefore, in this paper, it is the largest of the domestic educational institutions, it has the largest number of emissions talent, and selects the representative major field of humanities and society. Then, after analyzing the common curriculum in each major field, compare it with the training course of cybersecurity experts derived through existing previous research. Through analysis results, we try to design a retraining course for cybersecurity professional human resources. Utilizing the results of this research, it is expected that it will be used as the basic material necessary for the subjects of the re-curriculum education. It is also expected to contribute to resolving the supply-demand gap of cybersecurity professionals.

  • PDF

An Active Planning of the Information Security and Technology (정보보호와 기술의 활성화 방안)

  • 장우권
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.11 no.2
    • /
    • pp.83-112
    • /
    • 2000
  • In the 21st Century of the Knowledge-based Economy Internet's Openness, Globality, and Ease to access is the central axis to construct the new melting down and the development of the technology, industry. and culture. However it takes place the disordered ability in the information society. That is, to intrude personal privacy, unlawful actions, to circulate an illegal information, to encroach and to destroy information system, even to, to be in confusion society, national strategy, administration, economy, and military action. As conclusion, first, in this article it looks into and analyzes the information security technology and paradigm to prevent and to stop up criminal actions in the cyberspace. Second, this author propose an active planning of the information security and technology.

  • PDF

A Spatial Study on the Network Formation Process of Personal Actors: The Case of Institutional Building Networks in Industries for the Elderly (개인 행위주체의 네트워크 형성 과정에 대한 공간적 고찰: 고령친화산업의 제도구축 네트워크를 사례로)

  • Koo, Yang-Mi
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.11 no.3
    • /
    • pp.334-349
    • /
    • 2008
  • In this study, the network formation process of personal actors in industries for the elderly was analyzed. This process is applied to the knowledge creation model of the SECI (Nonaka-Takeuchi learning cycle), that is socialization, externalization, combination, internalization. There are some kinds of opportunities to interact in these industries in the forms of field survey teams to overseas, some seminars and symposiums, many kinds of meetings, education and training programs, trade fairs and on-line forums. These palces(ba) - originating ba, interacting ba, cyber ba, exercising ba - played great roles in the formation of personal actor networks. Personal actors had opportunities to interconnect with distant actors through those places(ba). In the spatial perspective, personal actors could make face-to-face contact and build trust through temporary geographical proximity or temporary clusters with the help of personal mobility. Relations in the virtual spaces such as the Internet community did much toward building personal networks.

  • PDF

3D virtual shopping mall implementation based on the rich media technology (리치미디어 기술 기반의 3D 가상쇼핑몰 구현)

  • Lee, Jun;Kang, Eung-Kwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.2
    • /
    • pp.229-238
    • /
    • 2007
  • Cyber shopping mall is based on technique of the Internet that is purpose in a new business form from cyber space. Cyber shopping mall's economic activity will be much grow up and upswing compare than past object economy. Therefore we proposed the interactive Internet shopping mail system. Especially, the proposed shopping mali is 3D interaction Cyber Shopping mall based on 'Rich media Technique' and it different with existing shopping mall. This system is represent to Hyper view when the customer click the object what they want to buy during cyber space tour. This system can be Move, Rotate, Zoom in, Zoom out and Play the object. This system can increase customer's feeling more interesting, immersion, etc. And 3D objects look like a real thing get out of the conventional 2D image form is great contribute to increase customer's interest.

Dynamics of Digital Location and Geographical Distance on Cyberspace (글로벌 사이버 공간에서 디지털 위치와 지리적 거리에 관한 연구)

  • Park, Han-Woo;Barnett, George;Kim, Hyo-Dong
    • Journal of the Korean association of regional geographers
    • /
    • v.10 no.2
    • /
    • pp.356-370
    • /
    • 2004
  • New communication and information technologies such as the Internet are space-adjusting technologies. The Internet changes the spatial proximity by improving the connections between people and organizations separated by geographical distance This paper examines the digital position of individual nation-states on a global cyberspace. The number of inter-domain hyperlinks embedded in websites for 47 nations was gathered using the AltaVista in 2001 Data were also obtained on the geographical distance among the nations. The results indicate that the u.s. is the most central nation on the global cyberspace, followed by the U.K., Germany, Australia, Canada, Italy, France, China and Japan. The most peripheral nations are Uruguay, Luxemburg, and UAE. It also examines the relationship between the digital positions of 47 nations and their physical locations. The results indicate that digital structure on the cyberspace is not significantly related to geographical distance among those nations.

  • PDF

An Exploratory Study on Sustainable Lifelong Education Model -Focusing the Cyber University in Korea- (지속가능성을 위한 평생교육모형에 관한 탐색적 연구 -사이버대학을 중심으로-)

  • Lee, Jin-Soo
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.6
    • /
    • pp.53-68
    • /
    • 2010
  • Sustainable development has been recognized as one of the most important issues in economic growth since quantitative growth reached its limit. It is claimed that a non-economic value such as human right, education, welfare, and health is a vital factor for sustainable development. Most of all, education is considered to be the most important key to build up sustainable society. E-learning could make it easier for all to spread equal education out. This paper suggests a model for cyber universities which can explain how much cyber universities contribute to improve the sustainable development and what social responsibilities cyber university can carry out as lifelong education institutes. Cyber universities in Korea seem to aim quasipublic, openness, and integration to solve the educational issues we face and uncover their growth potential. Cyber universities will contribute to build sustainable society through giving a huge education opportunities for all based on boosting liberal art education, mass-education, globalization, and commercialization.

  • PDF

Cyberattack Goal Classification Based on MITRE ATT&CK: CIA Labeling (MITRE ATT&CK 기반 사이버 공격 목표 분류 : CIA 라벨링)

  • Shin, Chan Ho;Choi, Chang-hee
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.15-26
    • /
    • 2022
  • Various subjects are carrying out cyberattacks using a variety of tactics and techniques. Additionally, cyberattacks for political and economic purposes are also being carried out by groups which is sponsored by its nation. To deal with cyberattacks, researchers used to classify the malware family and the subjects of the attack based on malware signature. Unfortunately, attackers can easily masquerade as other group. Also, as the attack varies with subject, techniques, and purpose, it is more effective for defenders to identify the attacker's purpose and goal to respond appropriately. The essential goal of cyberattacks is to threaten the information security of the target assets. Information security is achieved by preserving the confidentiality, integrity, and availability of the assets. In this paper, we relabel the attacker's goal based on MITRE ATT&CK® in the point of CIA triad as well as classifying cyber security reports to verify the labeling method. Experimental results show that the model classified the proposed CIA label with at most 80% probability.