• Title/Summary/Keyword: Cyber Networking

Search Result 63, Processing Time 0.029 seconds

Factor Analysis of Negative SNS Behaviors using Association Rules (연관규칙을 이용한 SNS에서의 부정적 행동 요인 분석)

  • Lee, Soojung
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.2
    • /
    • pp.61-68
    • /
    • 2013
  • SNS is a social networking service that helps people to have a two-way communication, manage their personal relationships and share information. The domestic and international SNS markets have attained a steady growth, and their growth is being more accelerated recently. Under these circumstances, immature students are more likely to show negative cyber behavior. This study attempted to analyze the relationship between the use of SNS, motives of SNS use, the use of active SNS functions, SNS-dependency and views in SNS and negative SNS behaviors among elementary and middle school students. For this, negative cycber behaviors are classified into four stages depending on the severity, for each of which distribution of factors is investigated and the combination of factors to determine each stage is obtained through association rule analysis. As a result, it is found that 85% of the students rarely show negative cyber behaviors, stealing personal information and contacting with strangers are the most frequent negative behaviors, and students with a great dependency on SNS are highly probable to show negative behaviors.

  • PDF

A Study on the Countermeasure of Cyber Attacks Using Anonymous Network (익명네트워크를 이용한 사이버공격에 대한 대응방안 연구)

  • Lee, Jung-Hyun;Ahn, Kwan-Joon;Park, Won-Hyung;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.31-37
    • /
    • 2011
  • Recently on tile network to ensure the anonymity of Mixed networking has been actively researched. It uses encrypted communications between Nodes and communications path is changed often to the attacker traceback and response, including the difficult thing is the reality. National institutions and infrastructure in these circumstances, the attack on the national level, if done on a large scale can be disastrous in. However, an anonymous network technology to cover up their own internet communication, it malicious form of Internet use by people who enjoy being continually updated and new forms of technology being developed is a situation continuously. In addition, attacks in the future application of these technologies is expected to continue to emerge. However, this reality does not deserve this thesis is prepared. In this paper, anonymously using a network to respond effectively to a cyber attack on the early detection research is to proceed.

Identification of Profane Words in Cyberbullying Incidents within Social Networks

  • Ali, Wan Noor Hamiza Wan;Mohd, Masnizah;Fauzi, Fariza
    • Journal of Information Science Theory and Practice
    • /
    • v.9 no.1
    • /
    • pp.24-34
    • /
    • 2021
  • The popularity of social networking sites (SNS) has facilitated communication between users. The usage of SNS helps users in their daily life in various ways such as sharing of opinions, keeping in touch with old friends, making new friends, and getting information. However, some users misuse SNS to belittle or hurt others using profanities, which is typical in cyberbullying incidents. Thus, in this study, we aim to identify profane words from the ASKfm corpus to analyze the profane word distribution across four different roles involved in cyberbullying based on lexicon dictionary. These four roles are: harasser, victim, bystander that assists the bully, and bystander that defends the victim. Evaluation in this study focused on occurrences of the profane word for each role from the corpus. The top 10 common words used in the corpus are also identified and represented in a graph. Results from the analysis show that these four roles used profane words in their conversation with different weightage and distribution, even though the profane words used are mostly similar. The harasser is the first ranked that used profane words in the conversation compared to other roles. The results can be further explored and considered as a potential feature in a cyberbullying detection model using a machine learning approach. Results in this work will contribute to formulate the suitable representation. It is also useful in modeling a cyberbullying detection model based on the identification of profane word distribution across different cyberbullying roles in social networks for future works.

Internet of Things (IoT) Based Modeling for Dynamic Security in Nuclear Systems with Data Mining Strategy (데이터 마이닝 전략을 사용하여 원자력 시스템의 동적 보안을 위한 사물 인터넷 (IoT) 기반 모델링)

  • Jang, Kyung Bae;Baek, Chang Hyun;Kim, Jong Min;Baek, Hyung Ho;Woo, Tae Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.1
    • /
    • pp.9-19
    • /
    • 2021
  • The data mining design incorporated with big data based cloud computing system is investigated for the nuclear terrorism prevention where the conventional physical protection system (PPS) is modified. The networking of terror related bodies is modeled by simulation study for nuclear forensic incidents. It is needed for the government to detect the terrorism and any attempts to attack to innocent people without illegal tapping. Although the mathematical algorithm of the study can't give the exact result of the terror incident, the potential possibility could be obtained by the simulations. The result shows the shape oscillation by time. In addition, the integration of the frequency of each value can show the degree of the transitions of the results. The value increases to -2.61741 in 63.125th hour. So, the terror possibility is highest in later time.

A Study on Living Space with the Internet Information Appliances (인터넷 정보가전을 활용한 주거공간 연구)

  • 전흥수;김주연
    • Korean Institute of Interior Design Journal
    • /
    • no.28
    • /
    • pp.44-50
    • /
    • 2001
  • This study propose the new concept of residence by analyzing the change of residence through the characteristic of popularity and degree of development of technology on home network information appliance for intelligent home. Accordingly, Cyber village represented as home automation and extend to information of society. it encourage need of information and multimedia of home. It expect home information infrastructure for accepting informations, which make smart home to linked home-working home-learning home-treatment. home-shopping and home-banking. The system of intelligent home is the intelligence of human-biology in the side of environmental friendly and multi-function. it distinguish the system of security, controlling system of inside environment, supporting system of house-working, automatic controlling, house working. Future house require to meet demand of young generation, such as small residental space, the multi-functional space, the flexible space, making mood for dual income couple and of single as intelligent home. Accordingly, basic purpose which are pleasantness, the safe and the convenience the mobile multi-function as well as networking with controlling of temperature, security, health-test, home-entertainment, home-office and consider environment together.

  • PDF

Development of the Broadband PLC Home Controller using JINI Surrogate

  • Kim, Yong-Seok;Kim, Hee-Sun;Lee, Chang-Goo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1563-1567
    • /
    • 2005
  • The Home network system means that information appliances, Home PCs, etc., using wired or wireless network method enable to control and share with peripheral devices such as internet, shared data, a scanner and a printer, and it is networking solution, which intelligent communication will be possible as the system which can do a remote control such as TV Set, refrigerators, air conditioners, DVD players, digital camcorders based on external network using an internet, a potable information terminal and a mobile phone whenever, wherever and freely. In this study, the home network interface solution is used one of the wired network standards, PLC (Power-Line Communication) technology, so we can construct of intelligent home network's home controller without re-build a network at home. On keeping with current waves of thought, we will focus on a home controller development with great interest which is enabled to do an effective managed control, applying intelligent home network technology which can be new paradigm like a cyber apartment.

  • PDF

Adolescents' Experiences of Cyberbullying on Mobile SNS (청소년의 모바일 SNS 사이버 언어폭력 경험 관련 요인에 관한 연구)

  • Jeong, Yeojin;Son, Seohee
    • Journal of Families and Better Life
    • /
    • v.35 no.2
    • /
    • pp.1-16
    • /
    • 2017
  • The purpose of this study was to investigate adolescents' individual and microsystem variables including relationships with parents and friends affecting adolescents' experiences of mobile social networking site (SNS) cyberbullying based on the human ecological perspective. Data came from 344 middle school students who lived with both their parents in the Seoul and Gyunggi areas. A multiple regression analysis showed that adolescents' characteristics, relationships with parents, and friends were associated with their experiences of mobile SNS cyberbullying. These findings suggest that good relationships with parents could be protective factors for adolescents to reduce mobile SNS cyberbullying. However, adolescents' characteristics including aggression, depression, and delinquent peers were positively associated with adolescents' experiences of mobile SNS cyberbullying. This study highlights that various environments are closely related to adolescent development.

An Implementation d Lecture authoring tool with JMF (JMF(Java Media Framework)로 구현한 강의 저작 도구)

  • Kim Il-Min
    • Journal of Digital Contents Society
    • /
    • v.6 no.1
    • /
    • pp.13-17
    • /
    • 2005
  • With the development of internet and networking technology, on-line remote educations in many area are being experimented. As on-line remote educations become more common, many people make multimedia contents for educational purpose. We designed and implemented a lecture authoring tool which provide easy way to build educational multimedia contents. We implemented the authoring tool with Java JMF, which can be executed any computer hardware. The purpose of this paper is to share the experience of implementing authoring tool and the implementation result of the authoring tool using Java JMF.

  • PDF

Artificial intelligence (AI) based analysis for global warming mitigations of non-carbon emitted nuclear energy productions

  • Tae Ho Woo
    • Nuclear Engineering and Technology
    • /
    • v.55 no.11
    • /
    • pp.4282-4286
    • /
    • 2023
  • Nuclear energy is estimated by the machine learning method as the mathematical quantifications where neural networking is the major algorithm of the data propagations from input to output. As the aspect of nuclear energy, the other energy sources of the traditional carbon emission-characterized oil and coal are compared. The artificial intelligence (AI) oriented algorithm like the intelligence of a robot is applied to the modeling in which the mimicking of biological neurons is utilized in the mathematical calculations. There are graphs for nuclear priority weighted by climate factor and for carbon dioxide mitigation weighted by climate factor in which the carbon dioxide quantities are divided by the weighting that produces some results. Nuclear Priority and CO2 Mitigation values give the dimensionless values that are the comparative quantities with the normalization in 2010. The values are 1.0 in 2010 of the graphs which are changed to 24.318 and 0.0657 in 2040, respectively. So, the carbon dioxide emissions could be reduced in this study.

The Study on The Cyber Communities of Migrant Workers in Korea (한국 이주 노동자의 '사이버 공동체'에 관한 연구)

  • Lee, Jeong Hyang;Kim, Yeong Kyeong
    • Journal of the Korean association of regional geographers
    • /
    • v.19 no.2
    • /
    • pp.324-339
    • /
    • 2013
  • This study aims to investigate the characteristics of cyber communities composed of migrant workers from communities without propinquity in Korea. Its methods are both qualitative and quantitative. It further seeks to discover the relationship between the social capital formed and reproduced within these cyber communities and participants' cultural adaptation to Korean society. The study revealed that ethnic and non-ethnic communities differed in terms of strength of cohesion, space constraints, and links with the outside world. The former showed characteristics of a localized community type. The main motivations for migrant workers' participation in the ethnic cyber community were communication and friendship rather than cooperation and sharing among members. They usually used cyber communication media to communicate with one another. Conversely, the latter showed characteristics of an integrative type. Despite the difficulties in applying for membership and information provided in Korean, a high percentage of migrant workers participated in the community to obtain crucial information. The results did not show a significant correlation between social capital and migrant workers' traits within the cyber community, while a strong correlation emerged among four factors of social capital: faith, norms, networking, and political participation. The study showed that social capital in the cyber community was in direct proportion to an integrative type of cultural adaptation to Korean society. In particular, there was a strong connection between the cultural adaptation exhibited by members of the migrant subculture and their participation in discussions on political issues and human rights, with some migrants even functioning as agents of social change as participants in citizens' movements. The findings suggest that the cyber community facilitates the migrant subculture's communication with and integration into the indigenous Korean culture. Migrant workers' participation in the cyber community is therefore validated as an instrumental practice for members of this subculture to adapt to Korean society.

  • PDF