• Title/Summary/Keyword: Cyber

Search Result 4,621, Processing Time 0.032 seconds

Effects that Faith Factor of Social Bonds Have on Cyber Bullying Phenomenon (사회유대의 신념요인이 사이버 불링 가해 현상에 미치는 영향)

  • Lee, Young-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.1
    • /
    • pp.256-262
    • /
    • 2016
  • A cyber crime has been evolving, as other crimes have. Beyond physical damages such as financial crimes in the cyber world, it has evolved into psychological forms like cyber-bullying. In today's crimes, measures that consider psychological effects of crimes are highly regarded in that fear of crime is considered as well as visible crimes. Accordingly, cyber bullying, which causes psychological damages, needs to be treated very importantly. Because the characteristics of cyber crime is caused by different circumstances from the real world, measures should be taken in different aspects. Rather than physical damages, which can be found in the conventional crimes, cyber crimes cause psychological damages, so the effect that has on inflicting should be specified. Especially, in the environment that virtual reality is ubiquitous through smart phones, it is very difficult to establish measures by considering all the causes of general cyber crimes. Therefore, this study estimated what affects cyber bullying by focusing on personalized faith factor among social bond theory, which can control cyber crimes. As a result, self-controling faith was verified to have a negative effect on cyber bullying, so faith is a very important factor in personalized environment. Thus, it is suggested that the characteristics of cyber space and education of humanism, which can affect individuals' faith should be emphasized.

A Study on the Influence of Victimization Experience and Awareness on Cyber Security Behavior - Focusing on Dual Process Theory (침해 경험 및 정보보호 인식이 정보보호 행동에 미치는 영향에 대한 연구 : 이중 프로세스 이론을 중심으로)

  • Kim, Chang-Il;Heo, Deok-Won;Lee, Hye-Min;Sung, Wook-Joon
    • Informatization Policy
    • /
    • v.26 no.2
    • /
    • pp.62-80
    • /
    • 2019
  • The purpose of this study is to investigate the direct effect of victimization experience on cyber security behavior and the indirect effect of information protection awareness through the Dual Process Theory. Baron & Kenny regression analysis was conducted and the results are as follows - first, victimization experience has a positive effect on cyber security behavior; second, the relationship between victimization experience and cyber security behavior is mediated by cyber security awareness; and third, the direct effect of victimization experience on cyber security behavior and the indirect mediating effect of cyber security awareness are both positive (+). The direct effect of victimization experience on cyber security behavior is analyzed to be relatively large compared to the indirect effect that cyber security awareness has on cyber security behavior. Based on these results, It is suggested that periodic cyber security education and campaign policies are needed to enhance cyber security behavior.

A Study on the Development of a Training Course for Ship Cyber Security Officers (선박 사이버보안 책임자를 위한 교육과정 개발에 관한 연구)

  • Lee, Eunsu;Ahn, Young-Joong;Park, Sung-ho
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.26 no.7
    • /
    • pp.830-837
    • /
    • 2020
  • With the rapid development of information and communication technology, information exchange between ships and shore has become faster and more convenient, However, accessing ship information has also become easier and concerns about cyber security attacks are growing. When a ship suffers a cyber-attack, it may cause considerable damage and incurs enormous costs and time to repair. In response to this threat, the maritime industry now demands that a cyber security officer be assigned to each ship to take charge of cyber security management onboard. In order to reduce the damage cause by an attack and to respond effectively, a specialized training course for the ship's cyber security officer is required. The purpose of this study was to present a training course for the position of the ship's cyber security officer, and to highlight the necessity of amending current legislation, To this end, domestic and foreign trends, ship cyber security incident cases, and cyber security training courses were investigated, and based on the results a standard training course for a ship's cyber security of icer was developed. Additionally, recommendations on the related amendments to legislation ware established. The results of the study can be used as basic data to establish future training courses for cyber security officers.

Encounter Measure System Against Cyber-Terror And Legalism (사이버테러 대응체제와 법치주의)

  • Jeong, Jun-hyeon;Kim, Kui-nahm
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.83-90
    • /
    • 2004
  • Preventive measures and control over cyber terrorism in Korea is a complex problem. Today laws should meet requirements made by modern technologies development, Law enforcement, special services and judicial system cooperation, their efforts coordination and their material security are priority directions, None of the country is able to prevent cyber terror independently and international cooperation in this field is vital. Taking the above into consideration, we propose and inisit that National Intelligence Service(NIS) should share cyber terror data with Police Agency and have top police authority over the cyber terror.

  • PDF

A Study on Economic Effects on Cyber Protection (사이버정보보호의 경제적 효과에 관한 연구 - 경제적 효과 추정방법론 수립을 중심으로 -)

  • Shin, Jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.475-478
    • /
    • 2012
  • Cyberspace is becoming increasingly important. Incidentally, there exist possibilities of the industrial secrets leaked, cyber attacks, privacy protection problems. In addition, there are growing concern of cyber war between nations. Thus potential hazards in cyberspace and the extent of damage are getting bigger. Therefore, a systematic understanding of cyber damage and damage scale is very important and damage estimation method should be developed to establish solid cyber protection system. In this study, current and potential damage types are understood and damage scales are surveyed based on the analysis of existing studies and try to develop a reasonable methods to estimate economic effects of cyber protection.

  • PDF

The Relationship between Cyber Leisure Activity and Autonomic Function in High School Students (청소년의 사이버 여가활동과 자율신경계 기능의 관계)

  • Son, Mi-Eun;Kim, Na-Hyun
    • Journal of Korean Biological Nursing Science
    • /
    • v.14 no.1
    • /
    • pp.33-40
    • /
    • 2012
  • Purpose: The purpose of this study was to explore the relationship between cyber leisure activity and autonomic function in high school students. Methods: The subjects of this study were 242 second graders at high school located in D city. The research design was descriptive correlation study. Data were collected from August 26 to September 17, 2010, using a cyber leisure questionnaire and heart rate variability (SA-6000, Medicore, Korea) for autonomic function. Results: Total time for the cyber leisure activity was $391.3{\pm}262.0$ (min/week). Time for internet usage and computer game was $234.5{\pm}140.1$ (min/week) and $156.8{\pm}164.3$ (min/week), respectively. There were significant positive correlation between total cyber leisure time and sympathetic activity (r=.247, $p$ <.001). Conclusion: Excessive cyber leisure activity could increase sympathetic activities in high school students. Thus, nursing intervention to reduce the total cyber leisure time will be helpful to improve their neurophysiological status.

Introduction of Requirements and Regulatory Guide on Cyber Security of I&C Systems in Nuclear Facilities (원전 계측제어시스템의 사이버보안 요구사항)

  • Kang, Young-Doo;Jeong, Choong-Heui;Chong, Kil-To
    • Proceedings of the KIEE Conference
    • /
    • 2008.10b
    • /
    • pp.209-210
    • /
    • 2008
  • In the case of unauthorized individuals, systems and entities or process threatening the instrumentation and control systems of nuclear facilities using the intrinsic vulnerabilities of digital based technologies, those systems may lose their own required functions. The loss of required functions of the critical systems of nuclear facilities may seriously affect the safety of nuclear facilities. Consequently, digital instrumentation and control systems, which perform functions important to safety, should be designed and operated to respond to cyber threats capitalizing on the vulnerabilities of digital based technologies. To make it possible, the developers and licensees of nuclear facilities should perform appropriate cyber security program throughout the whole life cycle of digital instrumentation and control systems. Under the goal of securing the safety of nuclear facilities, this paper presents the KINS' regulatory position on cyber security program to remove the cyber threats that exploit the vulnerabilities of digital instrumentation and control systems and to mitigate the effect of such threats. Presented regulatory position includes establishing the cyber security policy and plan, analyzing and classifying the cyber threats and cyber security assessment of digital instrumentation and control systems.

  • PDF

Research on System Architecture and Simulation Environment for Cyber Warrior Training (사이버전사의 훈련을 위한 시스템 구축 방안 연구)

  • Ahn, Myung Kil;Kim, Yong Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.533-540
    • /
    • 2016
  • It is important to establish the environment for cyber warrior training, testing support and effectiveness analysis in order to cope with sharply increasing cyber threat. However, those practices cannot be easily performed in real world and are followed with many constraints. In this paper, we propose a live/virtual M&S-based system for training/testing and constructive M&S-based system for effectiveness analysis to provide an environment similar to real world. These can be utilized to strengthen the capability to carry out cyber war and analyze the impact of cyber threat under the large-scale networks.

The Research on the Cyber Dating Violence of Korean High School Students (청소년의 사이버 데이팅 폭력 및 관련요인에 관한 연구)

  • Park Ok Im;Bae Yeong Suk;Kim Jeong Sook;Kim Jong Seong
    • The Korean Journal of Community Living Science
    • /
    • v.16 no.3
    • /
    • pp.65-73
    • /
    • 2005
  • The purpose of the research was to investigate the characteristics and related factors of cyber dating violence. The subjects were 548 adolescents in high schools. The gathered information was analyzed by frequency, percent, 1-test, ANOVA, and Correlation by using SPSS 10.0 program. The results were as follows: (1) $65.3{\%}$ of the answerers experienced cyber dating, and $44.5{\%}$ of the students have experienced cyber dating violence. (2) $40.3{\%}$ of the students were damaged by psychological violence, and $21.1{\%}$ of the students have caused psychological violence. (3) $41.9{\%}$ of the damaged students and $18{\%}$ of the perpetrating students were included in the total answerers, but among 244 experienced students, $94.3{\%}$ were damaged students and $40.6{\%}$ perpetrated sexual violence, so it is concluded that experienced students experience sexual violence. (4) Looking over the social demography factors and cyber dating violence, boys rather than girls, and vocational school students rather than academic school students have more cyber violence experiences. (5) The relationship between psychological and sexual violence has a significant relationship with all cyber violence experiences.

  • PDF

Cyber Insurance and Distribution Channels

  • Kwak, Young-Arm;Cho, Young-Sang
    • Journal of Distribution Science
    • /
    • v.16 no.5
    • /
    • pp.61-70
    • /
    • 2018
  • Purpose - These days, an individual user, private entity, hears everyday news of hacking and personal information leakage in the era of a most-connected society. This study investigates cyber attack, cyber insurance and distribution channels for insurance goods in South Korea by analyzing various cases of cyber attacks in domestic and overseas case. Research design, data and methodology - This study adopted various study cases instead of the one large case for deep quality analysis, and focused on various cases of domestic and overseas cyber attacks with insurance. Result - As a result of analyzing the cases that were hacked, types of massive losses and damages arising out of internet blackout due to cyber risks are paralyzation of public and private website and portal, electronic administrative system, public infrastructure, and consequently a normal operation of nation is impossible. These losses and damages however can be coverable under cyber insurance. Conclusions - This paper suggests insurance carriers, as suppliers, should provide multiple channels to sell to the customer and should expand the strategy of advertisement and promotion in order for them to change their mind and compare the price and value of the information of individual users and private entity in view of cost savings.