• Title/Summary/Keyword: Cyber Organization

Search Result 133, Processing Time 0.027 seconds

A Study on the Usability test and Space Syntax analysis in Web Museum (Museum Web 공간의 사용성 평가와 구조분석에 관한 연구)

  • 최성욱;황미영;임채진
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2002.04a
    • /
    • pp.99-104
    • /
    • 2002
  • The main concept of this thesis is to research about how to express the interface element of the virtual museum on tile cyber space and how to evaluate its organization. In addition, the basis of this thesis is to help people build their efficient spaces on the current virtual museum. My understanding about the interface element and its structural evaluation is grounded on Usability evaluation and Syntax thesis. For the survey, I utilize two different methods. One is regular questionnaire; the other is heuristic evaluation which is derived from empirical study and practical experience. The survey is mainly composed of contents, design, usability and overall impression. The main concept of this research is to establish the initial foundation of the virtual museum on cyber space by suggesting an objective evolutional norm including esthetic orientation.

  • PDF

Experiment on countermeasures against cyber security vulnerabilities using redundancy of ISO 19847 Shipboard Data Server (ISO 19847 선박 데이터 서버 이중화를 통한 사이버 보안 취약성 대응 방안 실험)

  • Lee, ChangUi;Lee, Seojeong
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.6
    • /
    • pp.793-806
    • /
    • 2022
  • As the IMO introduced MASS (Maritime Autonomous Surface Ships), ISO(International Organization for Standardization) announced ISO 19847 of a maritime data sharing standard for collecting and remotely managing data of ship systems. Previous literature evaluated the risk using HAZOP for ISO 19847 and proved that risk assessment is useful through experiments. However, redundancy of ISO 19847 ship data server which is one of the risk reduction method suggested in previous literature, was designed but couldn't tested due to the limitations of the conditions. So, in this study, to prove the usefulness of the ship data server redundancy of ISO 19847 which was not tested in previous literature. It based on the design of previous literature, and the network of ship data servers was modeled using the SES/DEVS format and simulated using the DEVS# open source library.

A Study on the Analysis of the Structure of the Korean Coffee Industry and the Development Strategy for Individual Coffee Shops (한국 커피산업구조분석과 개인 커피전문점 발전전략에 대한 연구)

  • Oh, Dae Young;Lee, Min Jung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.687-688
    • /
    • 2022
  • 국내 커피산업에 있어서 2020년 기준으로 개인 커피전문점 점포수는 7만 5520곳으로 전체 커피전문점 점포수의 90%를 차지하였으나, 국내 3대 대형 커피프랜차이즈(스타벅스, 투썸플레이스, 이디야)의 매출액 비중은 60%으로 대형 커피프랜차이즈의 매출비중이 매우 높다[1]. 개인 커피전문점의 경우 대형프랜차이즈에 비해 자본력과 브랜드 파워 부족으로 어려움을 겪고 있는데, 본 연구에서는 마이클포터의 Five-Forces Model을 커피산업에 적용하여 한국 커피산업 외부환경을 분석하고, VRIO 분석을 통해 개인 커피전문점 내부자원을 분석하여 개인 커피전문점의 발전을 위한 경영전략을 도출하고자 한다.

  • PDF

An Asset-Mission Dependency Model Adaptation and Optimized Implementation for Efficient Cyber Mission Impact Assessment (효율적인 임무 피해 평가를 위한 자산-임무 의존성 모델 적용 및 최적화된 구현)

  • Jeon, Youngbae;Jeong, Hyunsook;Han, In sung;Yoon, Jiwon
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.10
    • /
    • pp.579-587
    • /
    • 2017
  • Cyber Mission Impact Assessment is one of the essential tasks which many militaries and industrial major companies should perform to effectively achieve their mission. The unexpected damage to an organization's assets results in damage to the whole system's performance of the organizations. In order to minimize the damage, it is necessary to quantify the available capacity of the mission, which can be achieved only with the remaining assets, and to immediately prepare a new second best plan in a moment. We therefore need to estimate the exact cyber attack's impact to the mission when the unwanted damage occurs by modeling the relationship between the assets and the missions. In this paper, we propose a new model which deals with the dependencies between assets and missions for obtaining the exact impact of a cyber attack. The proposed model distinguishes task management from asset management for an efficient process, and it is implemented to be optimized using a vectorized operation for parallel processing and using a buffer to reduce the computation time.

A Study on Zero Trust Establishment Plan for Korean Military (한국군 맞춤형 제로 트러스트(Zero Trust) 구축방안 연구)

  • Kyuyong Shin;Chongkyung Kil;Keungsik Choi;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.131-139
    • /
    • 2023
  • In recent years, there have been frequent incidents of invasion of national defense networks by insiders. This trend can be said to disprove that the physical network separation policy currently applied by the Korea Ministry of National Defense can no longer guarantee military cyber security. Therefore, stronger cybersecurity measures are needed. In this regard, Zero Trust with a philosophy of never trusting and always verifying is emerging as a new alternative security paradigm. This paper analyzes the zero trust establishment trends currently being pursued by the US Department of Defense, and based on the implications derived from this, proposes a zero trust establishment plan tailored to the Korean military. The zero trust establishment plan tailored to the Korean military proposed in this paper includes a zero trust establishment strategy, a plan to organize a dedicated organization and secure budget, and a plan to secure zero trust establishment technology. Compared to cyber security based on the existing physical network separation policy, it has several advantages in terms of cyber security.

On the enhancement of the learning efficiency of the self-organization neural networks (자기조직화 신경회로망의 학습능률 향상에 관한 연구)

  • Hong, Bong-Hwa;Heo, Yun-Seok
    • The Journal of Information Technology
    • /
    • v.7 no.3
    • /
    • pp.11-18
    • /
    • 2004
  • Learning procedure in the neural network is updating of weights between neurons. Unadequate initial learning coefficient causes excessive iterations of learning process or incorrect learning results and degrades learning efficiency. In this paper, adaptive learning algorithm is proposed to increase the efficient in the learning algorithms of Self-Organization Neural Networks. The algorithm updates the weights adaptively when learning procedure runs. To prove the efficiency the algorithm is experimented to classification of strokes which is the reference handwritten character. The result shows improved classification rate about 1.44~3.65% proposed method compare with Kohonan and Mao's algorithms, in this paper.

  • PDF

A Study on Enterprise and Government Information Security Enhancement with Information Security Management System (정보보호관리체계를 통한 기업 및 정부 정보보안 강화 방안에 관한 연구)

  • Park, Chung-Soo;Lee, Dong-Bum;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.6
    • /
    • pp.1220-1227
    • /
    • 2011
  • According to the development of IT technology, life itself is becoming the change to Knowledge-based systems or information-based systems. However, the development of IT technology, the cyber attack techniques are improving. And DDoS a crisis occurs frequently, such as cyber terrorism has become a major data leakage. In addition, the various paths of attack from malicious code entering information in the system to work for your company for loss and damage to information assets is increasing. In this environment, the need to preserve the organization and users of information assets to perform ongoing inspections risk management processes within the organization should be established. Processes and managerial, technical, and physical systems by establishing an information security management system should be based. Also, we should be introduced information security product for protecting internal assets from the threat of malicious code incoming to inside except system and process establishment. Therefore we proposed enterprise and government information security enhancement scheme through the introduction of information security management system and information security product in this paper.

A Cognitive Study on the Usability of Cross-referencing link ad Multiple hierarchies (교차적 연결과 다계층구조의 유용성에 관한 인지적 연구 : 사이버쇼핑몰의 커스터머 인터페이스를 중심으로)

  • 이정원;김진우
    • Korean Journal of Cognitive Science
    • /
    • v.10 no.1
    • /
    • pp.25-43
    • /
    • 1999
  • The focus of this study is on the elements of structure design that facilitate u user interaction with applications within cyberspace Structure design entails decisions regarding the optimal classification and hierarchical organization of information into s successively higher units. i.e .. the grouping of highly related information in the form of nodes of a site and the subsequent connection of nodes that are inter-related. The decisions are based on the designer's subjective classification framework. which is not always compatible with that of the user. We propose that the ensuing cognitive dissonance can be reduced via the employment of multiple hierarchies and cross-referencing links. Multiple hierarchies represent a single information space in terms of a number of single hierarchies. each of which represent a different perspective Cross-referencing refers to the inter-connection between the constituent hierarchies by providing a link to the alternate hierarchy for information that is most likely to be categorized in diverse manners by users with differing perspectives. In this study we conducted two empirical studies to gauge the effectiveness of multiple hierarchies and Cross-referencing links in the domain of cyber shopping malls. In the first phase. an experiment was conducted to determine how subjects classified given products with respect to two different perspectives for categorization. Experimental cyber malls were developed based on the results from the first phase to test the effectiveness of multiple hierarchies and cross-referencing links. Results show that the ease of navigation was higher for cyber malls that had implemented cross-referencing links are of greater value when used in conjunction with single hierarchical designs rather than multiple hierarchies. Users satisfaction with and ease of navigation was higher for cyber malls that had not implemented multiple hierarchies. This paper concludes with discussion of these results and their implications for designers of cyber malls.

  • PDF

기업 사이버재난 관리를 위한 재해경감활동계획 수립

  • Lee, Young-Jai;Lee, Sung-Joong
    • Review of KIISC
    • /
    • v.20 no.4
    • /
    • pp.42-51
    • /
    • 2010
  • Government legislates a private sector preparedness act related to disasters such as natural, technological, and social ones. According to the law, it announces new standard for private sector preparedness. This paper illustrates a mitigation action plan based on the standard in terms of a cyber disaster. This plan includes organization, policy, assessment, impact analysis, strategy, plan, action, evaluation, and feedback. It will also help for business to mitigate a cyber disaster. Private sector accreditation and certification preparedness program which introduces on the law is the realization that enterprise disaster management will be expected as a great tipping-point.

An Educational Service Platform using Collective Intelligence and Presence of Web 2.0

  • Kim, Chang-Suk;Son, Dong-Cheul;Cho, Chung-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.1
    • /
    • pp.115-121
    • /
    • 2009
  • Web 2.0 has become the face next generation Web among the business world and research community. Web 2.0 is instant superficial gratification of people. On the other hand, Semantic Web is deep, meaningful and lasting relationship with data. So, it is difficult to apply the Semantic Web to the real world. In this paper, a platform for educational services using the Semantic Web and Web 2.0 is proposed. The proposed platform is based mix of the Semantic Web and Web 2.0, so it is useful to apply in the real world applications. Two services are presented, one is a semantic email system and the other is a cyber study space. The cyber study space adjusted each student is presented. The study environment is called iStudySpace that has personal scheduler, study status plan table, personalized search engine and several gadgets. Finally characteristics and limitations of the Semantic Web and Web 2.0, the organization and components of the platform, evaluation of iStudySpace are shown.