• Title/Summary/Keyword: Cyber effectiveness analysis

Search Result 102, Processing Time 0.027 seconds

Analysis of the Satisfaction and Effectiveness Awareness of Cyber Home Learning System for the Low-Income Bracket Children (저소득층 학생에 대한 사이버가정학습의 만족도 및 효과성 인식 분석)

  • Choi, Gil-Su;Kim, Yong-Dae;Lee, Jong-Yun
    • The KIPS Transactions:PartA
    • /
    • v.16A no.5
    • /
    • pp.395-402
    • /
    • 2009
  • Since 2005, Cyber home learning systems(CHLS) have been run with the purpose of clearing up the regional disparity and reducing the private education cost. At this point, it is necessary to have the analysis on the satisfaction and effectiveness awareness of the CHLS. The goal of this paper is to suggest an evaluation model for satisfaction and pedagogical effectiveness of CHLS and to support the management of satisfaction and effectiveness awareness of the CHLS for the low-income bracket children. Our major contributions can be summarized as follows: First, we present an evaluation model of satisfaction and effectiveness awareness of the CHLS for the low-income bracket children. Second, we survey the satisfaction, effectiveness awareness and improvement facts from the students who divided according to their sex, residence area and classes and compare with suggesting evaluation models. This paper is to find the measurement of the satisfaction and effectiveness awareness of the CHLS for the low-income bracket children. Furthermore, we can use this model as a material to balance the education opportunity, which is the purpose of CHLS, and abolish the education differentials.

Analysis of Login and Learning Hour in Cyber Classes of Undergraduate Students (학부 사이버강의 수강생들의 로그인과 학습 시간 분석)

  • Moon, Bong-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.171-177
    • /
    • 2007
  • The cyber classes of an e-Learning system have been considered as one of the important form of education. However, there is no or little study of effectiveness and function for the students' position. In this study, I analyzed log files in the e-learning system, and classified login and teaming hour patterns of students, who were enrolled in the undergraduate courses of the university, into hourly pattern in a daily pattern in a week, weekly pattern in a semester. I proposed general ideas to improve effectiveness and function of current e-learning. Over 50% of logins were for less than 30minutes learning and there is wasteful use of e-learning system resources.

  • PDF

Test development and verifying the validity and reliability for measuring a effectiveness of e-learning course in cyber university (사이버대학에서의 강좌평가를 위한 측정도구 개발 및 양호도 검증)

  • Joo, Young-Ju;Kim, Na-Young;Cho, Hyun-Kook
    • Journal of The Korean Association of Information Education
    • /
    • v.12 no.1
    • /
    • pp.109-120
    • /
    • 2008
  • The purpose of this study is to develop a test and verifying the validity and reliability for measuring a effectiveness of e-earning course in cyber university. Twenty-five items were developed based on literature review and were examined by experts in the field. For item analysis, EFA(Exploratory Factor Analysis) was performed with 768 students in first study. In order to validate the test, CFA(Confirmatory Factor Analysis) was conducted with 791 students in second study. The result of the study yielded five factors with 25 items: 1) contents and design, 2) instructor, 3) system, 4) evaluation, and 5) overall course satisfaction. And this research reports the reliability and validity of new test.

  • PDF

A Study on Improving the Act on Information and Communication Network for Enhancing the Effectiveness of Cyber Incident Reporting (침해사고 신고의 실효성 제고를 위한 정보통신망법 개선 연구)

  • Tae-seung Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.801-811
    • /
    • 2023
  • With the cyber incidents increasing every year, opinions are being raised that legal system relating to incident reporting needs to be revised to improve the cyber incident reporting rate, etc. Accordingly, this paper suggests a legal improvement to enhance the effectiveness of cyber incident reporting. First, by analyzing domestic media coverage, this paper defines the problems which need to be improved regarding an incident reporting system as "unreported" and "not timely reporting". Then, this paper finds four requirements for legal improvement like "a reporting entity", "a starting point of reporting", "a reporting deadline" and "a protection of reporting information" by analyzing the relationship between reporting relating problems and issues published by overseas institutions and additionally by analyzing the need to revise the law. Finally, through an analysis of legislative cases, this paper suggests a legal improvement for the requirements.

New Higher-Order Differential Computation Analysis on Masked White-Box AES (마스킹 화이트 박스 AES에 대한 새로운 고차 차분 계산 분석 기법)

  • Lee, Yechan;Jin, Sunghyun;Kim, Hanbit;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.1-15
    • /
    • 2020
  • As differential computation analysis attack(DCA) which is context of side-channel analysis on white-box cryptography is proposed, masking white-box cryptography based on table encoding has been proposed by Lee et al. to counter DCA. Existing higher-order DCA for the masked white box cryptography did not consider the masking implementation structure based on table encoding, so it is impossible to apply this attack on the countermeasure suggested by Lee et al. In this paper, we propose a new higher-order DCA method that can be applied to the implementation of masking based on table encoding, and prove its effectiveness by finding secret key information of masking white-box cryptography suggested by Lee et al. in practice.

Analysis of Cyber Incident Artifact Data Enrichment Mechanism for SIEM (SIEM 기반 사이버 침해사고 대응을 위한 데이터 보완 메커니즘 비교 분석)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.1-9
    • /
    • 2022
  • As various services are linked to IoT(Internet of Things) and portable communication terminals, cyber attacks that exploit security vulnerabilities of the devices are rapidly increasing. In particular, cyber attacks targeting heterogeneous devices in large-scale network environments through advanced persistent threat (APT) attacks are on the rise. Therefore, in order to improve the effectiveness of the response system in the event of a breach, it is necessary to apply a data enrichment mechanism for the collected artifact data to improve threat analysis and detection performance. Therefore, in this study, by analyzing the data supplementation common elements performed in the existing incident management framework for the artifacts collected for the analysis of intrusion accidents, characteristic elements applicable to the actual system were derived, and based on this, an improved accident analysis framework The prototype structure was presented and the suitability of the derived data supplementary extension elements was verified. Through this, it is expected to improve the detection performance when analyzing cyber incidents targeting artifacts collected from heterogeneous devices.

Model-based Autonomic Computing Framework for Cyber-Physical Systems (CPS를 위한 모델 기반 자율 컴퓨팅 프레임워크)

  • Kang, Sungjoo;Chun, Ingeol;Park, Jeongmin;Kim, Wontae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.7 no.5
    • /
    • pp.267-275
    • /
    • 2012
  • In this paper, we present the model-based autonomic computing framework for a cyber-physical system which provides a self-management and a self-adaptation characteristics. A development process using this framework consists of two phases: a design phase in which a developer models faults, normal status constrains, and goals of the CPS, and an operational phase in which an autonomic computing engine operates monitor-analysis-plan-execute(MAPE) cycle for managed resources of the CPS. We design a hierachical architecture for autonomic computing engines and adopt the Model Reference Adaptive Control(MRAC) as a basic feedback loop model to separate goals and resource management. According to the GroundVehicle example, we demonstrate the effectiveness of the framework.

A study on national cybersecurity policy agenda in Korea using national cyber capability assessment model (국가 사이버 역량평가 모델을 활용한 국내 사이버안보 정책 의제 도출 연구)

  • Song, Minkyoung;Bae, Sunha;Kim, So-Jeong
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.89-100
    • /
    • 2021
  • The National Cyber Capability Assessment(NCCA) could be used as meaningful information for improving national cyber security policy because it provides information on the elements necessary for strengthening national cyber capabilities and the level of each country. However, there were few studies on improving cyber capabilities using the NCCA result in Korea. Therefore, we analyzed the result of National Cyber Power Index(NCPI) conducted by Belfer Center of Harvard Univ. by applying modified-IPA method to derive cybersecurity policy agendas for Korea. As a result, the need to set agendas on surveillance and offensive cyber capability and improve the effectiveness of policy implementation for intelligence and defense was drawn. Moreover, we suggested need for in-depth study of each policy agenda deduced from preceding research data as a future tasks. And it is expected to increase practical use of NCCA for domestic policy analysis by developing and using our own NCCA model which considered analysis framework proposed in this study.

A Study on the Model for Preemptive Intrusion Response in the era of the Fourth Industrial Revolution (4차 산업혁명 시대의 선제적 위협 대응 모델 연구)

  • Hyang-Chang Choi
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.27-42
    • /
    • 2022
  • In the era of the Fourth Industrial Revolution, digital transformation to increase the effectiveness of industry is becoming more important to achieving the goal of industrial innovation. The digital new deal and smart defense are required for digital transformation and utilize artificial intelligence, big data analysis technology, and the Internet of Things. These changes can innovate the industrial fields of national defense, society, and health with new intelligent services by continuously expanding cyberspace. As a result, work productivity, efficiency, convenience, and industrial safety will be strengthened. However, the threat of cyber-attack will also continue to increase due to expansion of the new domain of digital transformation. This paper presents the risk scenarios of cyber-attack threats in the Fourth Industrial Revolution. Further, we propose a preemptive intrusion response model to bolster the complex security environment of the future, which is one of the fundamental alternatives to solving problems relating to cyber-attack. The proposed model can be used as prior research on cyber security strategy and technology development for preemptive response to cyber threats in the future society.

Establishment and Effectiveness Analysis of Emergency Vehicle Priority Signal Control System in Smart City and Directions for ISMS-P Technical Control Item Improvement (스마트시티 내 긴급차량 우선신호 제어시스템 구축과 효과성 분석 및 ISMS-P 기술적 통제항목 개선 방향성 연구)

  • Yoon, TaeSeok;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.9
    • /
    • pp.1166-1175
    • /
    • 2021
  • We investigate the current situation and development trend of domestic smart city and emergency vehicle priority signal control system analyzing the existing effectiveness of 1) emergency vehicle priority signal control system and 2) control emergency vehicle priority signal, based on domestic and foreign prior research for signal control system security. The effectiveness of time reduction was analyzed through actual application and test operation to emergency vehicles after establishing the system. In addition, for security management and stable service of real-time signal system control we propose improvement for the technical control items of the ISMS-P certification system to secure golden time to protect citizens' precious lives and property in case of emergency by classifying and mapping the existing ISMS-P certification system and the Korea Internet & Security Agency's cyber security guide according to the items of security threats.