• Title/Summary/Keyword: Cyber Organization

Search Result 135, Processing Time 0.023 seconds

Aspects of Warfare in the Information Age - NCW Concerning (정보화 시대의 전쟁양상 - Network Centric Warfare(네트워크 중심 전쟁)을 중심으로)

  • Woo, Hee-Choul
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.4
    • /
    • pp.45-50
    • /
    • 2016
  • This research suggests a method to contribute to the perfect execution of duty in prospective information warfare by inspecting network-based warfare, in which its basic concepts and efficient management plans are provided; it is especially important, due to growing focus on information warfare caused by sudden improvements on information technology which affects not only civil matters but international military affairs as well. For this purpose, this research scrutinizes on the chronological organization of warfare traits during the information age, and information-warfare execution, as well as its effects, thereby providing proper management plans for network-based warfare.

A Study on the Multimedia Communication and Distance Education for Information Society (정보화 사회에 따른 멀티미디어 통신과 원격교육에 관한 연구)

  • 정재영;김석수
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.1
    • /
    • pp.15-20
    • /
    • 1999
  • In this paper, we propose some essential requirements for CBM(Computer Based Multimedia) based distance education. This is a class of multimedia distance education in which the multimedia technique is combined with the distance home education application that is real time collaborative application on cyber-space using the information super highway. Requirements in this paper is observed standard at ITU(International Telecommunication Union). international standardization organization for multimedia communication. And. a structure for integrated home information service on the information super highway is based on IEEE 1394 serial communication and POF(Plastic Optical Fiber) home backbone that is study for application service according to the multimedia based distance home study system.

  • PDF

A Study on the PR Strategy of Public Library (공공도서관의 홍보 전략에 관한 연구- 서울의 공공도서관을 중심으로 -)

  • Lee, Man-Soo
    • Journal of Korean Library and Information Science Society
    • /
    • v.38 no.1
    • /
    • pp.3-28
    • /
    • 2007
  • It is thought that the various PRs of public library are the PR within the jurisdiction. outside the jurisdiction, by print media. by audio-video media. by fixture. by event. by media outlet. by campaign, through cyber space. and through associated organization. But the strategy of PR from this study is followed. First. the team for PR should be organized. Second. the librarian for PR should be distributed. Third, the budget for PR should be raised. Forth. the organizations of community should be made the full use of for PR. Fifth, the media outlet of the community should be made the best use of. Sixth. the news letter published by public library should be utilized. Seventh. the internet homepage of public library should be made good use of.

  • PDF

The Improvement Method of Internet Ethics Education for the Prevention of Internet Aftereffect (인터넷 역기능 예방을 위한 인터넷 윤리 교육 개선 방안)

  • Lee, Yun Bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1432-1440
    • /
    • 2013
  • In spite of advantages to using internet, but there are many adverse effects. The most well-known negative effects include internet addiction, personal information infringement, copyright violation, spread of harmful information, cyber bullying, online fraud, hacking and virus distribution, and online prostitution. Until now, the government and public organization strived to prevent and reduce the negative effects but have faced limitations. In accordance with, one of the measures the solve the problems caused by internet is to strengthen the internet ethics education. This study aims to consider and analyze the negative effects of internet and provide measures to promote internet ethics education to prevent and reduce such effects.

Measures for Activating Cyber Agricultural Consulting (사이버 농업 컨설팅 활력화 방안)

  • Oh, Dae-Min;Choi, Young-Chang
    • Journal of Agricultural Extension & Community Development
    • /
    • v.7 no.2
    • /
    • pp.289-293
    • /
    • 2000
  • The way society works in the 21st century differs from that of 20th century, since the people are brought-up to speed regarding current technologies. The www.aflos.pe.kr site and direct e-mailing system were very useful in delivering floricultural information to extension educators, producers, and variety of individuals. The author’s one year experience indicated that extension educators and farmers are receptive to internet technologies, and extension educators have increased the knowledge base of their clientele by responding through direct e-mails. The internet and direct e-mailing systems were popular and powerful way of transferring floricultural information, especially agricultural extension manpower were limited because of localization of extension educators by changing national status to local governments and decreased number of extension educators through government restructuring. The direct e-mailing to approximately 503 individuals resulted about $1{\sim}3%$ responses and the number of phone calls, however virus protection software for e-mail, internet, file servers and desktops to provide the integrated real-time detection of viruses were needed. For more effective operation of direct e-mailing in the future, more specified target groups and specialized organization such as perennials, bulbs, flowering potted plants. and cut flowers. At the same time, things that have worked for last century should not be replaced with new technology, specifically, the value in one-on-one meetings should not be replaced, but rather serve as a supplement.

  • PDF

A Study on PC Based Information System for Securing Availability of University's School Affairs (대학의 학사업무 가용성 확보를 위한 PC기반 정보시스템 구현에 관한 연구)

  • Jang, Hae-Sook;Park, Ki-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2323-2330
    • /
    • 2014
  • Most organizations are more depending on information system in advanced information society. According to this current, unrapid reaction to system failure can cause a fatal effect to a credibility of the organization. An excessively high level of dependence on information system at work makes itself as a primary target of cyber terror. The stability of university's information system is especially weaker than the enterprise's but policy support for securing availability is inadequate. In this paper, we consider the recovery system toward to disorder of university's school affairs information system theoretically and suggest high availability PC based academic administration system.

A Study of the PMI-based XML Access Control Model in Consideration of the Features of the Public Organization (공공기관의 특성을 고려한 PMI기반의 XML 접근제어 모델에 관한 연구)

  • Cho, Chang-Hee;Lee, Nam-Yong
    • Journal of Information Technology Services
    • /
    • v.5 no.3
    • /
    • pp.173-186
    • /
    • 2006
  • The local public organizations, to secure the Confidentiality, Integrity, Authentication and Non-Repudiation of cyber administrative environment is giving it a try to consolidate the official documents among them by standardizing all the documents into XML formats together with the establishment of the GPKI(Government Public Key Infrastructure). The Authentication System based on the PKI(Public Key Infrastructure) used by the GPKI, however, provides only the simple User Authentication and thus it results in the difficulty in managing the position, task, role information of various users required under the applied task environment of public organizations. It also has a limitation of not supporting the detailed access control with respect to the XML-based public documents.In order to solve these issues, this study has analyzed the security problems of Authentication and access control system used by the public organizations and has drawn the means of troubleshoot based on the analysis results through the scenario and most importantly it suggests the access control model applied with PMI and SAML and XACML to solve the located problem.

Analysing and Neutralizing the Stuxnet's Stealthing Techniques (Stuxnet의 파일 은닉 기법 분석 및 무력화 방법 연구)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.6
    • /
    • pp.838-844
    • /
    • 2010
  • This paper introduces Stuxnet, a malicious ware that presently stimulates severity of the cyber warfare worldwide, analyses how it propagates and what it affects if infected and proposes a process to cure infected systems according to its organization. Malicious wares such as Stuxnet secretes themselves within the system during propagation and it is required to analyze file hiding techniques they use to detect and remove them. According to the result of the analysis in this paper, Stuxnet uses the library hooking technique and the file system filter driver technique on both user level and kernel level, respectively, to hide its files. Therefore, this paper shows the results of the Stuxnet's file hiding approach and proposes an idea for countermeasure to neutralize it. A pilot implementation of the idea afterward shows that the stealthing techniques of Stuxnet are removed by the implementation.

Zero-knowledge proof algorithm for Data Privacy

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.67-75
    • /
    • 2021
  • As pass the three revised bills, the Personal Information Protection Act was revised to have a larger application for personal information. For an industrial development through an efficient and secure usage of personal information, there is a need to revise the existing anonymity processing method. This paper modifies the Zero Knowledge Proofs algorithm among the anonymity processing methods to modify the anonymity process calculations by taking into account the reliability of the used service company. More detail, the formula of ZKP (Zero Knowledge Proof) used by ZK-SNAKE is used to modify the personal information for pseudonymization processing. The core function of the proposed algorithm is the addition of user variables and adjustment of the difficulty level according to the reliability of the data user organization and the scope of use. Through Setup_p, the additional variable γ can be selectively applied according to the reliability of the user institution, and the degree of agreement of Witness is adjusted according to the reliability of the institution entered through Prove_p. The difficulty of the verification process is adjusted by considering the reliability of the institution entered through Verify_p. SimProve, a simulator, also refers to the scope of use and the reliability of the input authority. With this suggestion, it is possible to increase reliability and security of anonymity processing and distribution of personal information.

A Study on the Organizational Conflict and Job Withdrawal Intention of the Information Security Workers (정보보안 종사자의 조직갈등과 직무이탈 의도에 관한 연구)

  • Kim, Geunhye;Park, Kyudong;Shim, Mina
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.451-463
    • /
    • 2019
  • The purpose of this study is to identify the effects of organizational conflict stages and job withdrawal intention of information security organizations. We applied Pondy's conflict theory and analyzed the case of information security workers in public enterprises. We found that the more information security workers emotionally accept the potential factors of organizational conflict, the higher the intention of job change of information security practitioner. On the other hand, the perception mechanism has a moderating effect of lowering the job change-out probability. The result of this study is expected that the manager of the organization will be able to utilize the conflict in the organizational direction.