• Title/Summary/Keyword: Cyber Trend

Search Result 161, Processing Time 0.023 seconds

Development and evaluation of AI-based algorithm models for analysis of learning trends in adult learners (성인 학습자의 학습 추이 분석을 위한 인공지능 기반 알고리즘 모델 개발 및 평가)

  • Jeong, Youngsik;Lee, Eunjoo;Do, Jaewoo
    • Journal of The Korean Association of Information Education
    • /
    • v.25 no.5
    • /
    • pp.813-824
    • /
    • 2021
  • To improve educational performance by analyzing the learning trends of adult learners of Open High Schools, various algorithm models using artificial intelligence were designed and performance was evaluated by applying them to real data. We analyzed Log data of 115 adult learners in the cyber education system of Open High Schools. Most adult learners of Open High Schools learned more than recommended learning time, but at the end of the semester, the actual learning time was significantly reduced compared to the recommended learning time. In the second half of learning, the participation rate of VODs, formation assessments, and learning activities also decreased. Therefore, in order to improve educational performance, learning time should be supported to continue in the second half. In the latter half, we developed an artificial intelligence algorithm models using Tensorflow to predict learning time by data they started taking the course. As a result, when using CNN(Convolutional Neural Network) model to predict single or multiple outputs, the mean-absolute-error is lowest compared to other models.

The Chronological Stages of Advanced Online Education (온라인 고등교육의 변화에 대한 단계별 고찰)

  • Kim, Hyunkyung
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.12
    • /
    • pp.105-112
    • /
    • 2020
  • This study categorized the developments of advanced online education in Korea, which have achieved rapid growth for past 20 years, and analyzed the characteristics of each stage. Starting from the introduction stage, which focused on video content and basic LMS, it went through a growth stage in which the transition from lifelong to advanced education institute, and the first online graduate program accreditation were achieved. In the maturity stage, the expansion of online graduate programs led to the spread of online real-time classes and seminars, and the introduction and proliferation of smart-phone also paved the way for smart learning. However, as the non-face-to-face teaching method was suddenly implemented as a whole due to the COVID-19 pandemic, online education has rapidly developed and also faced various problems to improve the quality of education. By analyzing and reviewing the trend, this study discussed the problems facing the current revolutionary period and what needs to be solved for future development.

The Effect of Bakery Customers Product and Service Quality Factors on Value Perception, Customer Satisfaction and Behavioral Intentions: Focused on Famous Bakery Customers

  • HONG, Pil-Tae
    • The Korean Journal of Franchise Management
    • /
    • v.11 no.3
    • /
    • pp.7-18
    • /
    • 2020
  • Purpose: Recently, information on 'Delicious Restaurants (Mat-zip)' and 'Famous Bakeries' can be obtained through various media such as TV, Internet search, and SNS, and the culture of finding and sharing them has become a trend. Since PZB's SERVQUAL, there have been many studies measuring service quality, leading to hotels, restaurants and coffee shops. These studies of service quality include product quality in the service quality dimension. Hotels, restaurants, and coffee shops are provided with intangible services while customers visit and stay, but 'Delicious Restaurants (Mat-zip)' and 'Famous Bakeries' often stop by to buy products and return home. Therefore, the study on the effect of quality on customer behavior on 'Delicious Restaurants (Mat-zip)' should consider product quality separately. In this study, we want to study how each quality element affects the perceived value and response of customers by separating product quality and service quality. Research design, data, and methodology: This study tested the structural model of how the quality of products and services of famous bakeries affect customers' perceived value and response. As the quality factors, products, tangible services, and employee services were adopted, and perceived values adopted utilitarian and hedonic values, and customer responses adopted customer satisfaction and behavior intention. For this study, 203 survey data with experience using famous bakeries were analyzed using SPSS 22.0 and AMOS 22.0. Result: The research results are as follows. First, product quality positively influenced utilitarian value, hedonic value, and customer satisfaction, tangible service quality positively influenced utilitarian value, and employee service quality positively influenced hedonic value. Second, utilitarian value had a positive effect on behavioral intention, and hedonic value had a positive effect on customer satisfaction. Conclusions: In a famous bakery, it is basic that product quality should be given priority, and for customer satisfaction, employee service quality is half as important. In addition, for Behavior Intension (revisit by the customer), in addition to product quality, the quality of tangible services and employee services should be maintained at a quarter level.

Feasibility Analysis on the Attack Graph Applicability in Selected Domains

  • Junho Jang;Saehee Jun;Huiju Lee;Jaegwan Yu;SungJin Park;Su-Youn Hong;Huy Kang Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.5
    • /
    • pp.57-66
    • /
    • 2023
  • In this paper, a research trend of attack graph studies for Cyber-Physical System (CPS) environments is surveyed, and we analyse the limitations of previous works and prospect the future directions. 35 among around 150 attack graph studies conducted within 5 years target CPS, and we inspect key features of CPS environment in the security aspect. Also, we categorize and analyze target studies in the aspect of modelling physical systems and considering air gaps, which are derived as key features of the security aspects of CPS. Half of 20 research that we surveyed do not reflect those two features, and other studies only consider one of the two features. In this circumstance, we examine challenges that attack graph studies on CPS environment face. Finally, we expect state-led studies or studies targeting open-spec commercial CPS will dominate.

Research on the Zero Trust Trend Analysis and Enterprise Security Enhancement (제로트러스트 동향 분석 및 기업 보안 강화 연구)

  • Min Gyu Kim;Chanyoung Kang;Sokjoon Lee
    • Smart Media Journal
    • /
    • v.12 no.5
    • /
    • pp.46-57
    • /
    • 2023
  • As the COVID-19 pandemic and the development of IT technology have led to the gradual popularization of remote and telecommuting, cloud computing technology is advancing, and cyber attack techniques are becoming more sophisticated and advanced. In response to these trends, companies are increasingly moving away from traditional perimeter-based security and adopting Zero Trust to strengthen their security. Zero Trust, based on the core principle of doubting and not trusting everything, identifies all traffic and grants access permissions through a strict authentication process to enhance security. In this paper, we analyze the background of Zero Trust adoption and the adoption policies and trends of countries that are proactively promoting its implementation. Additionally, we propose necessary efforts from governments and organizations to strengthen corporate security and considerations for companies when applying Zero Trust.

A Study on the Generation and Transmission of Drone Jamming Signals Based on the MAVLink Protocol (MAVLink 프로토콜 기반 드론 교란 신호 생성 및 송출에 관한 연구)

  • Woojin Lee;Changhan Lim;Jaeyeon Lee
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.75-84
    • /
    • 2023
  • Recently, as the use of drones for military purposes is increasing, such as the Russia-Ukraine War, North Korea's reconnaissance against South Korea, and Army Tiger 4.0's dronebot system, anti-drone technology is developing a lot in each country. However, traditional anti-drone technologies in the form of using conventional weapons or electronic warfare weapons have the disadvantage of being expensive, so anti-drone technologies that can be performed at low cost are currently being newly researched. Therfore, in response to these anti-drone technologies, many efforts are being made to increase the survivability of our allies. In line with this trend, this study assumes a virtual anti-drone system applied with cyber domain and electronic warfare domain technologies that can be performed at low cost, rather than a technique using expensive conventional weapons or electronic warfare weapons among various anti-drone technologies. In response to this, we would like to present a plan to increase the survivability of friendly drones.

The cost of pressure to achieve in Korea (III): The psychological dynamics and factors influencing delinquent behavior (한국 사회와 교육적 성취 (III): 성취의 그늘, 한국 청소년 일탈행동의 형성과 심리적 역동)

  • Young-Shin Park;Uichol Kim
    • Korean Journal of Culture and Social Issue
    • /
    • v.14 no.1_spc
    • /
    • pp.223-253
    • /
    • 2008
  • This article examines the cost of pressure to achieve in Korea, which is the theme of the special issue focusing on the psychological dynamics and factors influencing delinquent behavior among Korea adolescents. This article reviews empirical studies of delinquent behavior among Korean adolescent and articulate policy and programs necessary to prevent the rising trend. First, in order to prevent delinquent behavior and enhance their self-efficacy, programs need to be developed to allow them to succeed in non-academic areas. Second, adolescents who engage in delinquent behavior are likely to experience problems in interpersonal, such as parental rejection, social exclusion from friends and hostility from teachers. Third, adolescents delinquent behaviors are influenced by negative parental socialization practices, delinquent behavior of their peers, moral disengagement and their previous participation in delinquent behavior. Fourth, the importance of indigenous psychological approach to increase the quality of life for adolescents who engage in delinquent behavior is outlined.

  • PDF

Task offloading scheme based on the DRL of Connected Home using MEC (MEC를 활용한 커넥티드 홈의 DRL 기반 태스크 오프로딩 기법)

  • Ducsun Lim;Kyu-Seek Sohn
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.61-67
    • /
    • 2023
  • The rise of 5G and the proliferation of smart devices have underscored the significance of multi-access edge computing (MEC). Amidst this trend, interest in effectively processing computation-intensive and latency-sensitive applications has increased. This study investigated a novel task offloading strategy considering the probabilistic MEC environment to address these challenges. Initially, we considered the frequency of dynamic task requests and the unstable conditions of wireless channels to propose a method for minimizing vehicle power consumption and latency. Subsequently, our research delved into a deep reinforcement learning (DRL) based offloading technique, offering a way to achieve equilibrium between local computation and offloading transmission power. We analyzed the power consumption and queuing latency of vehicles using the deep deterministic policy gradient (DDPG) and deep Q-network (DQN) techniques. Finally, we derived and validated the optimal performance enhancement strategy in a vehicle based MEC environment.

A Study on the Usability of Digital Humans in New Media Contents

  • Jihan Kim;Jeanhun Chung
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.300-305
    • /
    • 2023
  • This thesis is a study of content development utilizing media outlets to date through digital humans. The trend of global content is that the video content industry, including the character business, is growing. Lil Michela, who was selected as one of the 25 most influential people on the Internet by Time magazine in 2018, Nasua, who appeared in a SK Telecom commercial, and Rosie, who appeared in a Shinhan Bank commercial, are representative. Digital humans, which are driving new content, are computer-generated human characters with various characteristics and are referred to as virtual humans, metahumans, and cyber humans. With the rise of the metaverse after COVID-19, digital humans are being utilized in various forms such as media and marketing as an element of visual content. In the form of media, we can see that the boundaries between the offline and digital worlds are converging, and in the form of marketing, we can see that digital humans connect consumers and products more naturally. In the form of interaction, it is possible to achieve two-way communication through various methods of operation, and through these factors, it is possible to go beyond behavioral communication in the form of memorialization to emotional communication through AI technology. What can be seen through these processes is that through the currently developing digital human production methods and AI functions, not only experts but also non-experts can create quality contents, and new directions of contents will appear, and contents that can provide immediate feedback by bringing consumers and creators closer together have been studied.

A Study on the Current Status of Domestic and International Cybersecurity Education and the Importance of Regular Cybersecurity Education for Teenagers according to the Development of AI (국내외 정보보안 교육의 현황 및 인공지능의 발전에 따른 청소년 정보보안 정규교육의 중요성에 대한 연구)

  • Dahye Jeong;Sanghoon Jeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.527-536
    • /
    • 2024
  • In the digital age, the growth of AI and digital technologies brings opportunities and cybersecurity risks. At the forefront of this change are teenagers, referred to as 'digital natives'. However, they may have difficulty using technology safely without proper information security knowledge. This paper highlights the need for information security education for teenagers in South Korea by referring to cases in the UK, Australia, and the US. These countries are already providing education that prepares young people for cyber threats and future societal needs. Reflecting this trend, South Korea should also establish comprehensive information security education for teenagers to equip them for the digital age.