• Title/Summary/Keyword: Cyber Space

Search Result 476, Processing Time 0.026 seconds

Control of International Cyber Crime

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.2
    • /
    • pp.137-144
    • /
    • 2016
  • The followings are required to establish uniform principle of criminal jurisdiction for international cyber crime into customary international law; (1) clear guideline of UN for promoting national practice (2) formation of general practices based on these guidelines (3) these general practices should obtain legal confidence. International society is in close cooperation for investigating and controlling cyber threat. The US FBI has closed down the largest online crime space called 'Darkcode' and prosecuted related hackers based on joint investigation with 19 countries including England, Australia, Canada, Bosnia, Croatia, Israel, and Rumania. More and more people in Korea are raising their voices for joining cyber crime treaty, 'Budapest Treaty.' Budapest Treaty is the first international treaty prosecuting cyber crime by setting out detailed regulations on internet criminal act. Member countries have installed hotline for cyber crime and they act together. Except European countries, America, Canada, and Japan have joined the treaty. In case of Korea, from few years before, it is reviewing joining with Ministry of Foreign affairs, Ministry of Justice and the National Police but haven't made any conclusion. Different from offline crime, cyber crime is planned in advance and happens regardless of border. Therefore, international cooperation based on position of punishing criminals and international standards. Joining of Budapest international cyber crime treaty shall be done as soon as possible for enhancing national competence.

The Effect of Tension and Low Self-Control on Cyber Deviation: Analyzing The Mediating Effect of Internet Addiction and Moderating Effect of Anonymity (긴장과 낮은 자기통제력이 사이버일탈에 미치는 영향: 인터넷 중독의 매개효과와 익명성의 조절효과 검증)

  • Nam, Su-Jung
    • Journal of the Korean Home Economics Association
    • /
    • v.49 no.2
    • /
    • pp.63-74
    • /
    • 2011
  • Tension and self-control are explanatory factors in adolescent delinquency, and internet addiction and anonymity are regarded as factors underlying cyber deviation. The aim of this study was to investigate the interrelationships between these factors and cyber deviation. Participants were 485 middle and high school students in the Jeonbuk region. The results showed that tension and self-control were predictors of cyber deviation and that internet addiction was a mediating variable for both the predictors. Anonymity was found to have a mediating role, but only in respect of the tension-cyber deviation pathway. These findings suggested a number of implications. Firstly, the educational programs on cyber deviation should be different from the existing deviation prevention programs. Secondly, measures to prevent internet addiction are needed for the effective prevention of cyber deviation. Lastly, the finding of a relationship between anonymity and cyber deviation indicates the need to adopt a long-term perspective drawing on values education techniques to develop a code of cyber space ethics for "netizens".

Interactive Art that informs the seriousness of cyber verbal violence - 'Blame'

  • Eom, Taein;Lim, Chan
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.188-198
    • /
    • 2020
  • In the cyber space represented by Sns, the problem of cyber verbal violence, which sends slander messages such as abusive messages through chats, bulletin boards, malicious comments, and messages, is getting worse. Leveraging the power of cyberspace's anonymity, people can't hesitate to say what they can't say in the real world. In extreme cases, cyber verbal violence can lead to the death of a person. This paper focuses on the creation of media content that helps to inform and prevent the seriousness of cyber verbal violence prevalent on the Internet through interactive art. The nature of Interact art goes beyond the work and the audience to the people in the relationship between the work and the participants, allowing participants to directly and indirectly feel the seriousness of cyber verbal viol.

Effective Management Education in the Cyber Space: An Exploratory Investigation (사이버 환경에서의 효과적인 경영 교육에 관한 탐색적 연구)

  • Park Byoung-Jin;Yum Ji-Hwan
    • Journal of Information Technology Applications and Management
    • /
    • v.13 no.3
    • /
    • pp.89-105
    • /
    • 2006
  • Information revolution shifted the meaning of education from traditional face-to-face education to technology integrated virtual one, namely cyber education. A new way of education, however, has not constituted its methodological standards either performance measurement scheme. The study probes the critical factors that influence students' achievement and satisfaction especially in the cyber education environment. Using hierarchical regression, important factors for students' achievement and satisfaction in the management education environment are presented. The results indicate that students' individual characteristics are relatively less influential for cyber education success. Rather, institutional supports including provision of in-depth interaction among students and with the instructor are more critical. We can infer that cyber education essentially requires three factors: in-depth interactions with instructor collaborative environment among peer students technical support from the institution.

  • PDF

A Study on the Wizard Development to Automate the Construction of Shopping Mall with Distribution (배송을 포함한 쇼핑몰 구축 상점입점마법사에 관한 연구)

  • 최윤정;이창호
    • Journal of the Korea Safety Management & Science
    • /
    • v.3 no.3
    • /
    • pp.165-174
    • /
    • 2001
  • Internet is a global network and it produces many terminologies involved in Electronic Commerce. Among many terms people very much talked about Cyber Shopping Mall. Under situation customers and sellers paid attention to Cyber Shopping Mall which is beyond time and space. This study deals with two subjects to enlarge the competitive power of Mall & Malls which is integration of multiple Cyber Shopping Mall. First subject is constructing the Automated Mall Wizard which is efficiently and effectively building Cyber Shopping Mall Site. And second subject is to differentiate from other shopping malls. Automated Mall Wizard is composed of three stages which are decomposed into several descriptive steps. And descriptive steps takes form of independent module, so it is considered to maximize Cyber Shopping Mall differentiation. Additional functions are making the goods category, related goods to be simultaneously ordered, price comparison with other sites within the Mall & Malls, best seller goods, store advertisement, substitutive goods, and mileage policy. As a result of that, we can respect SuperMall is better than other Mall & Mall as to diversity and flexibility of constructed Cyber Shopping Mall.

  • PDF

The Relationship between Cyber Characteristics and Malicious Comments on Facebook : The Role of Anonymity and Dissemination (페이스북에서 사이버 특성과 악성댓글의 관계 : 익명성과 전파성의 역할)

  • Kim, Han-Min
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.1
    • /
    • pp.87-104
    • /
    • 2018
  • The internet is spreading widely and malicious comments which is a negative aspect is increasing. Previous studies have considered anonymity as a cyber characteristic of malicious comments. However, there are a theoretical confusion due to inconsistent results. In addition, the dissemination, one of cyber characteristics, have been mentioned the theoretical relationship on malicious comments, but measurement and empirical study about dissemination were still limited. Therefore, this study developed a measurement of dissemination and investigated the relationship between cyber characteristics (anonymity, dissemination) and malicious comments on Facebook. As a result of research, this study identified that anonymity is not significant on malicious comments and discovered that the dissemination of cyber space has a direct influence on malicious comments. This study suggests that information systems can contribute to malicious comments researches by proposing cyber characteristics.

The revitalization methods for the cyber community to consolidate the communities in apartment complexes;focused on the contents of their web sites (아파트 단지 내 공동체 강화를 위한 사이버 커뮤니티 활성화 방안;웹사이트상의 컨텐츠 현황과 이용실태를 중심으로)

  • Lee, Young-Ae;Kang, Soon-Joo
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 2006.11a
    • /
    • pp.185-189
    • /
    • 2006
  • attention to the elevation of the Quality of living, various ways to revitalize the community spirit are found including reforming hardhearted neighborhoods and overcoming the dreariness of city. With the development of the internet and the spread(dissemination) of "digital home", the communities in cyber space are especially active since we are living in an information-oriented society. To consolidate the communities in apartment complexes, this study tries to find revitalization methods of the cyber community by analyzing the contents of the web sites, understanding the cyber community. The cyber contents that are provided come from three main companies that develop the internet apartments. These are compared and analyzed. The related cyber communities("cafe") are also analyzed. The results are as follows. 1)Though they have some differences on details, the content provided from internet companies can be categorized as introduction to the apartment complex, personal service, community, club and internet shopping. 2)The contents on the cyber community made by the residents are mostly for clubs and chatting since they are made for communication between residents. 3)To revitalize the cyber community, the content that gets more attention from the residents needs to be subdivided into groups.

  • PDF

A Study for Recent major Cyber incidents and preventive measures (최근 주요 침해사고 유형과 예방 대책)

  • Jung, Ye-bin;Ha, Seong-hyeon;Lee, Se-Ho;Choi, Sang-Yong;Kim, Jeung-Sam;Lee, Jong-Rak
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.99-102
    • /
    • 2020
  • 인터넷 사용 인구가 증가하면서 이제 사이버공간은 우리 생활에서 중요한 인프라가 되었다. 최근 인터넷 침해사고의 추세는 주로 금전적인 이익을 얻기 위하여 발생하고 있으며, 그 수법이 갈수록 지능적이고 복합적인 기법들을 사용하여 대응과 분석이 점점 어려워지고 있다. 인터넷 침해사고는 이제 특정 개인, 기업의 문제가 아닌 사회적, 국가적 이슈가 되고 있다. 이처럼 인터넷 등 정보통신의 발달에 따른 생활의 편리함 등 순기능과 함께 해킹 등과 같은 역기능도 피할 수 없는 상황이다. 침해사고에 대한 대응은 특정 계급에 국한되는 것이 아니라 사이버공간을 이용하든 모든 사용자가 대비를 해야한다. 사이버 위협에 지속적으로 대비하고, 침해사고 예방 및 대응 수준과 사용자들의 보안 인식을 높혀 개인, 기업, 국가의 안전을 보장해야 할 것이다. 이에 본 연구에서는 침해사고 사례를 바탕으로 분석해 개인 인터넷 이용자들에게 인터넷 침해사고 예방 및 대응요령을 제공한다.

  • PDF

The Educational Strategy of Digital Design in Cyber-Space (With compose of teaming Communities through Communicational Function) (Cyber-Space에 있어서의 디지털 디자인 학습전략-커뮤니케이션 기능을 통한 학습공동체의 구성을 중심으로-)

  • 김태환;한영호
    • Archives of design research
    • /
    • v.14 no.2
    • /
    • pp.155-162
    • /
    • 2001
  • Recently, as the increase of internet users and the needs of the new educational paradigm, many educational institutions go into the cyberspace system. Especially, it is increase that the cooperative extension for supplying the degree and the remote lectures in the university itself. Mostly those lectures have the form of discussion with theoretical course in the center. It is needed to the development of educational tools for the other courses. The cyber education systems are due to be developed more and more. So we should consider the effective usage of recent techniques like this. Accordingly, I'd like to say what is the method of using effectively the cyber communication. It would be considered about the part of cyber communications and the educational effects that has classified into three parts: the cyber communication as a educational medium, the communication for the cooperative studies, and the theological background of the cyberspace communication. Moreover it is proposed the two parts of the effective study directions; the constitution of the community study, and the effective study factors.

  • PDF

A Study on the Countermeasures of Cyber Crimes Among Nations - Focusing on the Global Governance - (국가간 사이버범죄 대응체제 구축에 관한 연구 - 글로벌 거버넌스적 측면에서 -)

  • Oh Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.307-318
    • /
    • 2005
  • Cyber crimes caused unpredictable damages by influencing targets with means such as hacking and virus in virtual space. In specific, they transcend time and space because of their anonymity and it is difficult to punish the people who are involved in crimes. To manage such cyber crimes, we need an international cooperative systems beyond difference in legal systems between countries and 'Global Governance' was prepared as a reasonable alternative. These days, governance has been presented as an important concept to explain changed social systems or changed roles of government. It was not just a concept to replace traditional government of a single nation, but to overcome new problems on social actions of humans. So it is expected that it can help prepare reasonable measures through cooperation both in individuals and systems, and public and civil sectors. To countermeasure cyber crimes in terms of global governance, we can prepare general investigation systems and professional human resources through civil and public assistance, and provide a base on which international cooperation systems can be established.

  • PDF