• Title/Summary/Keyword: Cyber Trend

Search Result 163, Processing Time 0.024 seconds

A Study on Analysis of Cyber Security Companies Superiority-securing strategy in Competition and Problem-solving Strategy (국내 사이버 증권사의 경쟁우위 전략요인 및 문제점 분석에 관한 연구)

  • 양경훈;김도일;이태호;송병희
    • The Journal of Society for e-Business Studies
    • /
    • v.5 no.2
    • /
    • pp.1-25
    • /
    • 2000
  • The utilization of Internet, which started only at the level of advertisement, has been gradually expanding its application areas as the trial commercial transaction becomes successful, the password-coding technology which removes the risks on the cyber transaction develops, the electronic money appears and other various related technologies progress. Following this trend the securities industry has been experiencing changes along with efforts to use it commercially. This study is to analyze the work of cyber securities companies on the basis of the theoretical background through preceding studies and literature and also analyze the common and different reasons for superiority-securing strategy in competition along with problems and their reasons. And also the objective of this study is to offer new superiority-securing strategy in competition and problem-solving strategy.

  • PDF

A Study on Analysis of Cyber Security Companies Superiority-securing strategy in Competition and Problem-solving Strategy (국내 사이버 증권사의 경쟁우위 전략요인 및 문제점 분석에 관한 연구)

  • 양경훈;김도일;이태호;송병희
    • Proceedings of the Korea Database Society Conference
    • /
    • 2000.11a
    • /
    • pp.289-296
    • /
    • 2000
  • The utilization of Internet, which started only at the level of advertisement, has been gradually expanding its application areas as the trial commercial transaction becomes successful, the password-coding technology which removes the risks on the cyber transaction develops, the electronic money appears and other various related technologies progress. Following this trend the securities industry has been experiencing changes along with efforts to use it commercially. This study is to analyze the work of cyber securities companies on the basis of the theoretical background through preceding studies and literature and also analyze the common and different reasons for superiority-securing strategy in competition along with problems and their reasons. And also the objective of this study is to offer new superiority-securing strategy in competition and problem-solving strategy.

  • PDF

Security Threat Trend based on Drone Embedded System and Network Protocol (드론 임베디드 시스템 및 네트워크 프로토콜 기반 보안위협 동향)

  • Sang-Hyeon Park;In-Su Jung;Jin Kwak
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.190-191
    • /
    • 2023
  • IoT(Internet of Things) 기술을 기반으로 한 드론은 사용자의 요청에 따라 데이터 처리, 수집, 송·수신 등에 고도화된 ICT(Information and Communications Technology) 기술을 활용하고 있다. 또한, 드론은 ICT 기술이 발전함에 따라 문화, 소방, 국방 등 다양한 분야에 적용되어 사용자에게 편의를 제공하고 있다. 그러나, 드론에 적용되는 ICT 기술과 드론에 탑재되는 기술들이 고도화됨에 따라 드론 모듈 내 펌웨어 및 무선 네트워크를 대상으로 한 보안위협이 증가하고 있다. 따라서 본 논문은 드론의 보안위협에 대응하기 위하여 드론 임베디드 시스템 및 네트워크 프로토콜을 대상으로한 최신 보안위협 동향을 분석한다.

Effect of perceptions of attributes of Cyber Education on the adoption decision (사이버학습 속성인식이 학습참여결정에 미치는 영향 분석)

  • Suh, Soon-shik
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.1
    • /
    • pp.35-43
    • /
    • 2002
  • By entering the information society, the trend of increasing use of the cyber education to deliver high-Quality educational programs is likely to continue. For instance, supported by the government agencies, central officials training institute is expending vast amounts of money for the installation of cyber education programs. However, much of the research that has been done concerns the discrepancy between the potential and the actual use of technology in the field of education and training. The intent of this study was to identify the decision of the adoption of cyber education among national officials who had just peceived the existence the cyber education programs which would be used for their professional training and development, and to investigate the relationships between the Rogers' five attributes of innovation (relative advantage, compatibility, easy of use, observability, trialiability) and their decision of adoption. The results of the study generally concurred with Rogers diffusion of innovation theory revealing that perceived compatibility, easy of use, and observability of cyber education are significant predictors of decision to participate in cyber education.

  • PDF

A Study on the Problems of Procedural Law Against Cyber Crimes in Korea - On the Trend of Procedural Law Against Cyber Crimes of U.S - (우리 사이버범죄 대응 절차의 문제점에 관한 연구 - 미국의 사이버범죄대응절차법을 중심으로 -)

  • Lim Byoung-Rak;Oh Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.231-241
    • /
    • 2006
  • When current cyber attacks to information and communication facilities are examined, technologies such as chase evasion technology and defense deviation technology have been rapidly advanced and many weak systems worldwide are often used as passages. And when newly-developed cyber attack instruments are examined, technologies for prefect crimes such as weakness attack, chase evasion and evidence destruction have been developed and distributed in packages. Therefore, there is a limit to simple prevention technology and according to cases, special procedures such as real-time chase are required to overcome cyber crimes. Further, cyber crimes beyond national boundaries require to be treated in international cooperation and relevant procedural arrangements through which the world can fight against them together. However, in current laws, there are only regulations such as substantial laws including simple regulations on Punishment against violation. In procedure, they are treated based on the same procedure as that of general criminal cases which are offline crimes. In respect to international cooperation system, international criminal private law cooperation is applied based on general criminals, which brings many problems. Therefore, this study speculates the procedural law on cyber crimes and presents actual problems of our country and its countermeasures.

  • PDF

The threats and responses of cyber-terrorism in a new security environment: Issues and propositions on strategic frameworks (새로운 안보환경을 둘러싼 사이버 테러의 위협과 대응방안: 쟁점들과 전략적 접근 틀에 대한 논의)

  • Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.109-145
    • /
    • 2014
  • Despite much discussions on cyber-terrorism in South Korea, several missing issues could be addressed. This paper attempts to deal with such missing but important issues. In South Korea, there has been little attentions on cyber-terrorism with the respects of national security strategy development under macro framework responding to future security environment. This article focuses on such issues. In other words, the purpose of this paper evaluates the meaning of national security threats raised from cyber-terrorism as a mode of security threats and proposes the matter of cyber-terrorism within the development of national security strategy in the future security environment. several issues in this discussion pass some important messages for the construction of national security strategic approach framework within the future security environment adding cyber-space. in the future environment, a new space called cyber is added as an important external condition which might determine the security of individuals, societies, and nations. Therefore, the fundamental strategic framework should be prepared. After that, the trend and direction of future technological advancement should be understood and the identity, nature, and types of threat should be analyzed. Also, after that, various responses and countermeasures are together constituted in the aspect of function and system regarding various anticipated threats of the future human society including cyber-terrorism.

  • PDF

Design and Implementation of A Cyber Counseling System to Support Information for Student Guidance (학생지도 정보를 제공하는 사이버상담 시스템의 설계 및 구현)

  • 오세정;최숙영
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.12
    • /
    • pp.1573-1580
    • /
    • 2001
  • Due to development of technology of information technology, PC communication and Internet have become a culture space of teenagers. Because Internet and PC communication are media in which teenagers have interests, they could be effectively used to counsel teenagers in that time they want. Moreover, cyber counseling will be suitable to new trend of current age with extension of counseling area. Accordingly, many researches on cyber counseling have proceeded in the area of teenagers counseling. While most researches for cyber counseling until present are about counseling methods ad the effects that teenagers utilize cyber counseling, there were no efforts that store counseling contents, analyze them using features and technologies of web and use them effectively to guide students. Therefore, we implemented a cyber counseling system that provides counseling information so that teacher may grasp students various interests and problems and thus helps to guide students.

  • PDF

A Study of the Make-up Aesthetic Characteristics in Techno-Cyber Fashion (테크노-사이버 패션에서의 메이크업의 미적 특성)

  • Chung Kwi-Sook;Cho Kyoung-Hee
    • Journal of the Korean Society of Costume
    • /
    • v.54 no.7
    • /
    • pp.63-78
    • /
    • 2004
  • The purpose of this study examines the characteristics of the Techno-Cyber fashion in modern fashion, and especially, how the make-up in the Techno-Cyber fashion is expressed artistically, and finally how much the make-up has its aesthetic value and significance. This study has its meaning in studying the relationship between the Techno-Cyber fashion and the make-up. Further more, the study has its significance in that it is possible to consider the interaction of the make-up by the fashion trend. The way of the study is to analyze its features that are shown in the documents of the inside and outside of the country. the study precedent, the technical journal, and the fashion picture. And also the study refers to the related contents in the searching for internet. The aesthetic characteristics of the expressed make-up is shown with the various aesthetic styles, as follows : First, the future-oriented characteristics is shown as the expression of the metallic make-up that emphasizes the glitter and glossy texture, and of the transparent make-up that emphasizes the simplicity of the body. Second, the surrealistic characteristics is expressed to the collage make-up that expresses the unexpected character with the introduction of the special materials and the position changing and the graphic make-up that destroys the standardized form. Third, the anti-cultural characteristics is expressed to the Cyber-Punk make-up that expresses the destructive and challenging image. Finally, the compromise characteristics is shown in the Ethno make-up combined the concept of the ethnic with the high technology and the Androgynous make-up which destroys the bounds of the sex.

A Comparative Study on Type Approval of Maritime Cyber Security and RMF in the View of System Development Lifecycle (개발 전주기 사이버보안 관점에서의 해상 사이버보안 형식 승인과 RMF 비교 연구)

  • Lee, Suwon;Hwang, Seyoung;Hong, Jina;Kim, Byeong-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.279-287
    • /
    • 2022
  • With the advancement of cyber threats and the development of hacking technologies, cyber security is being emphasized in various fields such as automobiles and ships. According to this trend, various industrial fields are demanding cybersecurity, and related certifications. In this paper, cybersecurity type approval is compared with the RMF stage under the premise that there are common elements with RMF in that cybersecurity elements must be reflected in the entire system development cycle. For comparison, type approval of maritime cyber security of the Korean Register of Shipping was selected. In conclusion, although type approval of maritime cyber security acquisition procedure is not divided by development stage like the RMF, there are the commonalities in the procedure to apply the cybersecurity element to the System development lifecycle like the RMF. Accordingly, the possibility of determining that the cybersecurity element was applied to the entire development cycle was confirmed.

Research of Fashion Trend through Analysis on Cue II (단서분석(端緖分析)을 통(通)한 패션트렌드 연구(硏究) II)

  • Lee, Young-Jae
    • Journal of Fashion Business
    • /
    • v.6 no.2
    • /
    • pp.67-76
    • /
    • 2002
  • This research examines the characteristic trends through analysis on cue in the contemporary fashion distinctly and systematically. It is carried out by both qualitative analysis and quantitative analysis. In the qualitative analysis, the four important street fashions of neo-mods/jazz, neo-hippie/grunge, sportivecasual and technos/cyber-punk are grouped. In the quantitative analysis, statistical data are sampled from Collection II of the 1990s S/S. It takes frequency, percentage, $\chi^2$-test and etc. by using the comprehensive tools for statistical treatment. There were significant differences between the S/S fashion. According to the cues, there are also significant differences between the fashion in the 1990s. In 'Neo-Mos/Jazz' style shows highly androgynous look, deep and strong tone, green/blue colors, natural fabric, stripe pattern, long hair style, and hided make-up. 'Neo-hippie/gnenge' style shows highly folklore look, vivid tone purple colors, seethrough/knit fabric, natural /traditional pattern, decorative hair special makeup. 'Sportive casuals' style shows highly sportive look, greish tone, white/grey colours, natural fabric, solid patten, bobbed hair, and natural make-up. 'Techno/cyber punk style shows highly comocorps look, pale tone black colors avangard fabric, solid patten, punk/dyed hair special make-up.