• Title/Summary/Keyword: 사이버 역기능

Search Result 70, Processing Time 0.02 seconds

A Qualitative Research of Children's Mental Model on Media Environment and the Use (미디어 환경과 사용에 관한 아동의 심성모형 질적 연구)

  • Lee, Ran;Hyun, Eunja
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.6
    • /
    • pp.601-613
    • /
    • 2016
  • The purpose of this study is to present the mental model of young adolescents' media environment and the use and to provide several educational suggestions drawing on the revealed model. For this, the data were collected through 4 activities such as interview, picture drawings, word association experiment, and sentence completion task with ten 4-5th graders in elementary schools; they were qualitatively analyzed by 2 researchers. First, the meaning components driven by sentence completion task, word association experiment were totally 6 components: media device, connection(alienation), competence(provision), entertainment, adverse effects, ambilaterality. Second, the components of media mental model driven by pictures were 4 components: functions/competence, entertainment, conflict with paper books/sharing, harmfulness/ambilaterality. Third, the components from interview consisted of conflict between paper books and electronic media, communication-centeredness, fear(addiction) and users' qualification. Based on those results, careful examination in cyber talk, necessity of addiction prevention, active development of learning media and their balanced utilization with books, and healthful media literacy education and reinforcement of critical thinking were suggested.

Design of Intrusion Prevention System(IPS) in Linux Environment (Linux 환경에서의 침입방지시스템(IPS) 설계)

  • 이상훈;김우년;이도훈;박응기
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.21-26
    • /
    • 2004
  • The growth of incidents on the Internet has reflected growth of the internet itself and growth of the computing power. while in previous years, external attacks tended to originate from those interested trend in exploring the Internet for its own sake and testing their skills, there is an increasing trend towards intrusions motivated by financial, political, and military objectives. so, attacks on the nation's computer infrastructures are becoming an increasingly serious problem. Even though the problem is ubiquitious, government agencies are particularly appealing targets and they tend to be more willing to reveal such events than commercial organizations. The threat of damage made necessity of security's recognition, as a result, many researches have been carried out into security of system actively. Intrusion Detection technology is detection of intrusion using audit data differently from using traditional simple filtering and informs manager of it. It has security manager of system deal with the intrusion more quickly. but, cause current environment of Internet manager can't doing response Intrusion alert immediately. That's why IPS needed. IPS can response automatically the intrusion alert. so, manager is more comfortable and can response quickly.

  • PDF

Protection of Private information in Electronic Commerce (전자상거래에 있어 개인정보 보호에 관한 국.내외의 비교연구)

  • Cheung, Chong-Soo
    • International Commerce and Information Review
    • /
    • v.4 no.2
    • /
    • pp.77-96
    • /
    • 2002
  • Through the new round DDA(Doha Development Agenda) negotiations which started in Doha/Qatar conference in November, 2001, service industries have been included in the category of international trades. An electronic commerce cannot be exceptional in this field. The 21st century is largely recognized as the era of globalization, knowledge, and information. To make effective and competitive strategy in this century, it is essentially required to organize Network. OPEN, and FU-PLEX. That is why our government also has been promoting this field since years before, now 10,000,000 people in Korea have joined superhighway internet networks. Korea became the top internet-developed country in the world. As a side-effect of this internet spread into our life, however, there is serious problem we are now faced against. That is the outflow of private information through electronic commerce and other cyber transactions. It has caused many social problems to be rapidly on the rise these days. We are now desperately required to struggle continuously to make a solution for that. Taking the precedent case of Germany and United States which are currently recognized as high-leveled country in protection of private information, we have to come up with legal and technical measures and at the same time, to escalate the social consciousness about private information protection.

  • PDF

A Study of a Teaching and Learning Process of the Information and Communication Ethics Based on Creative Problem Solving Method (창의적 문제해결 과정 기반의 정보통신 윤리교육 교수-학습과정 연구)

  • Kwon, Jungin;Ahn, Seongjin
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.3
    • /
    • pp.41-48
    • /
    • 2013
  • It is not easy to find out well organized teaching and learning methodology as the adverse effects of the internet have made a lot of problems because we realize the importance of the information/cyber ethic education. In this paper, I suggest the teaching and learning process of the information/cyber ethic education as applying the creative problem solving process of the six-step model proposed by A. Osborn and S. Parnes. We divided fifth grade 54 elementary school students into two groups, a experimental group and a control group, and conducted the the teaching and learning experimental methods. The experimental group, conducted educational teaching and learning methods for information ethics education using creative problem solving process, got a better result compared to the other group. It must be one of the systematic approach to lead changes of learners'; recognition, focusing on the ethics problem-solving process.

  • PDF

A Study on N-IDS Detection and Packet Analysis regarding a DoS attack (DoS공격에 대한 N-IDS 탐지 및 패킷 분석 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.217-224
    • /
    • 2008
  • EThis paper is study regarding banking institution and DoS attack regarding government organization which occurred in 2008. We used a tool aggressive actual DoS You install the N-IDS which used Snort in networks in order to detect a DoS attack. Storages of Winpcap and a packet to detect a packet and MySQL, HSC, to analyze. We install NET Framework etc. E-Watch etc. analyzes Packet regarding a DoS attack of a hacker and TCP, UDP etc. information, Port, MAC and IP information etc. through packet analysis tools. There is a meaning you analyze data regarding the cyber DoS, DDoS attack that is dysfunction of Ubiquitous Information Society, and it generates forensics data regarding an invader and back-tracking analysis data, and to ensure safe Internet information system through this paper study.

  • PDF

A Study on Real IP Traceback and Forensic Data Generation against Bypass Attack (우회적인 공격에 대한 실제 IP 역추적 실시와 포렌식 자료 생성)

  • Youn, Byung-Sun;Yang, Hae-Sool;Kim, Dong-Jhoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.143-151
    • /
    • 2008
  • Execute IP traceback at this paper as target an intruder's attacking that Bypass Attack in order to avoid an exposure of own Real IP address Design IP traceback server and agent module, and install in Internet network system for Real IP traceback. Set up detection and chase range aggressive loop around connection arbitrariness, and attack in practice, and generate Real IP data cut off by fatal attacks after data and intrusion detection accessed general IP, and store to DB. Generate the Forensic data which Real IP confirms substance by Whois service, and ensured integrity and the reliability that buy to early legal proof data, and was devoted to of an invader Present the cyber criminal preventive effect that is dysfunction of Ubiquitous Information Society and an effective Real IP traceback system, and ensure a Forensic data generation basis regarding a judge's robe penalty through this paper study.

  • PDF

A Study on the Customized Security Policy for Effective Information Protection System (실효적인 정보보호관리 통제를 위한 맞춤형 보안정책 연구)

  • Son, Young-hwan;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.705-715
    • /
    • 2017
  • Today, the world is evolving into a huge community that can communicate with real-time information sharing and communication based on the rapid advancement of scientific technology and information. Behind this information, the adverse effects of information assets, such as hacking, viruses, information assets, and unauthorized disclosure of information assets, are continually increasing as a serious social problem. Each time an infringement of the invasion and personal information leaks occur, many regulatory policies have been announced, including stricter regulations for protecting the privacy of the government and establishing comprehensive countermeasures. Also, companies are making various efforts to increase awareness of the importance of information security. Nevertheless, information security accidents like the leaks of industrial secrets are continuously occurring and the frequency is not lessening. In this thesis, I proposed a customized security policy methodology that supports users with various business circumstances and service and also enables them to respond to the security threats more confidently and effectively through not a monotonous and technical but user-centered security policy.

A Study on ways to secure personal information stability according to the implementation of the mobile phone use system for milityary personnel (군장병 휴대전화 사용제도 시행에 따른 개인정보 안정성 확보 방안 연구)

  • Hwangbo, Wongyu;Shin, Dong-Kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.49-58
    • /
    • 2022
  • As military service members are fully permitted to use mobile phones for sickness after work, it is time to minimize the direct collection of personal information from telecommunication companies when opening mobile phones to secure the safety of military service personnel's personal information. Prior to introducing the use of mobile phones by soldiers after work, the Ministry of National Defense established a security control system such as blocking the mobile phone shooting function to prevent security accidents and concerns about some adverse functions such as illegal cyber gambling, game addiction, and viewing pornography. come. Mobile telecommunications companies entrust personal information processing tasks, such as opening mobile phones, to telecommunications agencies and carry out management and supervision, such as checking the status of personal information protection measures. When a military service member opens a mobile phone, a personal information management agency is newly established using the right to portability of personal information, and a system for requesting the transmission of personal information from the military service member is proposed.

Comparison of Internet Ethics between Gifted and General Students (영재학생과 일반학생의 인터넷 윤리의식 비교)

  • Lee, Jaeho;Lee, Kangmin
    • Journal of Creative Information Culture
    • /
    • v.5 no.1
    • /
    • pp.71-80
    • /
    • 2019
  • With the spread of smart phones, the Internet became a major 'space' of students' daily life and, at the same time, negative aspects of the internet are affecting their life. However, it doesn't seem that there is enough research on this subject. This study was conducted on 278 students in Gyeonggi. The results were as follows. First, gifted students' information and communication ethics index was higher than general students. Second, there was no statistically significant difference according to the gender of information and communication ethics index. Urban districts showed lower index in the upper grades than the lower grades. Third, about 10% of the students had experience of contact with harmful content, and about 1% of students had experienced cyber-wrongdoing. Through the results of this study, systematic education of IT ethics at the elementary school grade level can be expected to prevent school violence, improve information and communication culture, and serve as a future work ethic.

The Effect of Failure of Online Food Delivery Service Recovery Strategies on Consumer Attitude and Behavioral Intention: Focusing on Justice Theory (온라인 음식 배달 서비스 회복 전략의 실패가 소비자 태도 및 행동 의도에 미치는 영향: 공정성 이론(Justice Theory)을 중심으로)

  • Jungkun Park;Sangwoo Lee;Hyowon Hyun;Jihwan Yum
    • Journal of Service Research and Studies
    • /
    • v.13 no.2
    • /
    • pp.161-180
    • /
    • 2023
  • This study empirically analyzed the effect of perceived injustice on service recovery measures proposed by online food delivery service (OFDS) companies on consumer disappointment. This study adopted interaction justice, information justice, procedural justice, and distributive justice as sub-variables of justice perception based on the justice theory. In addition, the differences by generation (MZ generation and other generations) were examined in the relationship between negative word-of-mouth behavior and switching intentions due to service recovery failure. An online survey was conducted targeting 250 adult consumers in the U.S for the empirical analysis of this research model. The results of the data analysis demonstrated that negative perceptions about the procedural justice and distributive justice among the service recovery strategies had a positive effect upon the consumer's disappointment. Furthermore, it was confirmed that the consumer's disappointment due to the perceived injustice of the service recovery strategy had a positive effect on the consumer's negative word-of-mouth behavior and switching intentions. The verification results of the moderation effect in the relationship between negative word-of-mouth behavior and switching intention, it was found that the younger the age(MZ generation), the higher the possibility of causing dysfunctional behavior. This study expands the scope of related research by presenting a new perspective on the justice perception in the service recovery process by verifying dysfunctional behavior of consumers caused due to the failure of the service recovery strategy. It is believed that the results of this study will be used as basic data for the establishment of practical strategies for OFDS companies to prevent double defection of their customers.