• Title/Summary/Keyword: Cyber crime prevention education

Search Result 3, Processing Time 0.019 seconds

Factors Affecting Information Protection Efforts for Preventing Deviant Behavior of Adolescent in Cyber Space (사이버 일탈행위 예방을 위한 개인 정보보호 노력의 영향요인 연구)

  • Um, Myoungyong;Park, Jin-Hee;Kim, Mi-Ryang
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.5
    • /
    • pp.31-41
    • /
    • 2005
  • The purpose of this study is to identify the determinants of planned behavior of adolescent, toward information security and cyber crime prevention. A survey methodology was used to investigate a proposed model of influence, and regression analysis was used to analyze the results. The hypothesized model was largely supported by this analysis, and the overall results indicate that the intention to actively participate in information security and cyber crime prevention is mostly influenced by the fear for cyber crime and the perceived usefulness of information security and cyber crime prevention activity. In addition, it was found that the perceived easy of use for information-security related ICT skill, fear for cyber crime, and social norm for information security influence the level of usefulness, but that the prior experience with information leaking was statistically insignificant factor to the level of usefulness and fear for crime. Useful suggestions for promoting information security and cyber crime prevention are also provided.

  • PDF

An Evaluation Study on the Effectiveness of National Cyber Crime Prevention Education Program: Based on the CIPP Model (CIPP 모형을 활용한 사이버 범죄 예방 교육 프로그램 평가에 관한 연구)

  • Jeong, Hwan-su;Woo, You-ran;Lee, Choong C.
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.9-18
    • /
    • 2019
  • This study investigates the factors affecting the educational satisfaction and the transfer of learning of cyber crime prevention education students in order to confirm the effectiveness of the current education. Based on the CIPP model, we confirmed whether the level of social demand and the level of knowledge in the context evaluation, recency of subjects in the input evaluation and interaction in the process evaluation affect the educational satisfaction and the transfer of learning of the students by conducting the survey for the students. As a result of analysis, it was proved that the level of knowledge, recency of subjects and interaction had a significant relationship with the educational satisfaction and recency of subjects, interaction and educational satisfaction significantly affect transfer of learning. Based on the findings, this study provides a few constructive suggestions to improve the effectiveness of the cyber crime prevention education program.

A Study of Information Leakage Prevention through Certified Authentication in Phishing, Vishing, SMiShing Attacks (Phishing, Vishing, SMiShing 공격에서 공인인증을 통한 정보침해 방지 연구)

  • Park, Dea-Woo;Seo, Jeong-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.2 s.46
    • /
    • pp.171-180
    • /
    • 2007
  • The financial crime that used morale anger Phishing, Pharming, Vishing, SMiSing etc. will gain during recent cyber crimes. We are study systematically whether or not leakage of information and infringement can how easily occur to Phishing, Vishing, SMiSing using a social engineering technique and VoIP at these papers through experiment. A hacker makes Phishing, Vishing site, and test an information infringement process of a user through PiSing mail and a virus, a nasty code, Vishing, a SMiSing character, disarmament of Keylogger prevention S/W etc. as establish server. Information by Phishing, Vishing, SMiSing is infringed with leakage in the experiment results, and confirm, and test certified certificate and White List and a certified authentication mark, plug-in program installation etc. to prevention, and security becomes, and demonstrate. Technical experiment and prevention regarding Phishing of this paper and Vishing attack reduce the damage of information infringement, and be education for Ubiquitous information security will contribute in technical development.

  • PDF