• Title/Summary/Keyword: Cyber look

Search Result 52, Processing Time 0.024 seconds

A Study on Futuristic Image of Fashion - Futuristic Image in 20C Fashion - (미래적 이미지 패션의 연구)

  • Ryu, Hyun-Jung
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.14 no.2
    • /
    • pp.11-21
    • /
    • 2012
  • The purpose of this study is to understand of future image in fashion for 20C, to suggest a guideline's role in the development on fashion designs study. The methods of this study are used academic literatures as well as practical study. Futuristic image in fashion is to introduce about the future period, as fashion goes ahead times. Trends and formative characteristics of future image in 20C fashion are summarized as follows. First, futuristic images in fashion for 20C had emerged strongly futurism, space look, kinetic look, glitter look, techno look, cyber look. Second, perspectives on response for future society's changes are summarized as follows. Attitude of futuristic images of fashion, futurism, space look, kinetic look and glitter look, had been favorable about future society's changes until 1980. In 1990, techno look had been defensive and cyber look had been aggressive about future society's changes. Third, formative characteristics of future image in 20C fashion are studied shape, material, color, pattern. Shape was preferred linear and geometric form in the first half of the 20C, but body conscious type had appeared often in the second half of 20C. Material maintained the luster or the metal touch. Color was based image of colorless and preferred the gold, silver or color feels like metal. Pattern was preferred clarity with geometric type in the first half of the 20C. On the other hand in the second half of 20C pattern of future image was dominated by vague and abstract chaotic type.

  • PDF

Utilizing Internet GIS for Cyber Governance (Cyber Governance를 위한 인터넷 GIS의 활용방안)

  • Kim, Kwang Ju
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.5 no.3
    • /
    • pp.68-76
    • /
    • 2002
  • As modern public administrations are constructing homepages based on GIS and enhancing public services through interactive communication with their citizens, cyber governance and internet GIS have been conglomerated more than before. As such, the transformation from 'GIS for public management' to 'Internet GIS for cyber governance' is in progress. In the future, cyber governance based on Internet GIS can be a new paradigm for public management. The aim of this study is to look for the applications of internet GISs for cyber governance. For this purpose, the study examines characteristics of cyber governance and internet GIS and analyses similarities between them. Based on this analysis, the study proposes various ways of applying internet GISs for cyber governance.

  • PDF

A Study on the Changing Image of Glossy Materials after 1960s (1960년대 이후 광택소재 이미지 변화에 대한 연구)

  • 이유경;이희현
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.6 no.1
    • /
    • pp.64-72
    • /
    • 2004
  • The purpose of this paper is to investigate the changing fashion image of the glossy materials including metal, leather, vinyl, latex, plastic etc. from 1960's to the present. Glossy materials used in the second half of the 20th century showed a restricted image combined with a specific social circumstance. They expressed a reflection of young and future-oriented space period of 1960s. Many designers like Paco Rabanne and Andre Courreges were concerned with the fashion of space age and expressed that image with leather and synthetic materials including silver leather, metal chain armor, and plastic appeared as the keynote of fashion. In 1970's, glossy material was the symbol of avant-garde and rebellious attitude by the punk fashion. They maximized glamourous look of 1980s, and cyber look with an expectation for a new millenium of 1990s. On the other side, glossy materials seem to be used as a source of various inspiration of fashion designer in the 21st century. Also, some of the past images, for example space look and glamourous look, are revived in the 21 st century by the form of modified design.

  • PDF

Research of Fashion Trend through Analysis on Cue II (단서분석(端緖分析)을 통(通)한 패션트렌드 연구(硏究) II)

  • Lee, Young-Jae
    • Journal of Fashion Business
    • /
    • v.6 no.2
    • /
    • pp.67-76
    • /
    • 2002
  • This research examines the characteristic trends through analysis on cue in the contemporary fashion distinctly and systematically. It is carried out by both qualitative analysis and quantitative analysis. In the qualitative analysis, the four important street fashions of neo-mods/jazz, neo-hippie/grunge, sportivecasual and technos/cyber-punk are grouped. In the quantitative analysis, statistical data are sampled from Collection II of the 1990s S/S. It takes frequency, percentage, $\chi^2$-test and etc. by using the comprehensive tools for statistical treatment. There were significant differences between the S/S fashion. According to the cues, there are also significant differences between the fashion in the 1990s. In 'Neo-Mos/Jazz' style shows highly androgynous look, deep and strong tone, green/blue colors, natural fabric, stripe pattern, long hair style, and hided make-up. 'Neo-hippie/gnenge' style shows highly folklore look, vivid tone purple colors, seethrough/knit fabric, natural /traditional pattern, decorative hair special makeup. 'Sportive casuals' style shows highly sportive look, greish tone, white/grey colours, natural fabric, solid patten, bobbed hair, and natural make-up. 'Techno/cyber punk style shows highly comocorps look, pale tone black colors avangard fabric, solid patten, punk/dyed hair special make-up.

The Countermeasure for Threat of Cyber Terror in Sociological Perspective (사회적 이슈 관점에서 바라 본 사이버 테러 유형에 대한 위험 대응방안)

  • Choi, Heesik;Kim, Hyunkyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.59-67
    • /
    • 2017
  • In recent years, cyber terror that break into major institution's information system and destroy and paralyzed important information occurs frequently. Some countries do dangerous acts such as train hackers and order hackers to hack important industrial confidential documents which are core of national competitiveness to reduce the competitiveness of the country and cause social confusion. In this thesis, it will study problems of cyber terror to help people to use Internet in web environment that safe from cyber terror and to avoid the risk from cyber terror such as malware and DDos. This thesis is organized as following. In second chapter, it will look thorough the research that are related to cyber terror. In third chapter, it will study attack types of cyber terror. In fourth chapter, to defend from cyber violence, it will suggest safe solution. In fifth chapter, it will end with conclusion. Finally, to prevent urgent incidents like North Korean Cyber-attack, every Internet user must indicate their recognition on Internet security and it is significant to make a quick response treatment to create the safe online environment.

Cyber Security Considerations and Countermeasures for UAM Air Traffic Management Infrastructure (UAM 항공교통관리 인프라의 사이버보안 고려사항 및 대응방안)

  • Kyungwook Kim
    • Journal of Information Technology Applications and Management
    • /
    • v.30 no.6
    • /
    • pp.17-29
    • /
    • 2023
  • In this paper, we aim to propose cyber security considerations and countermeasures for infrastructure and services in the UAM(Urban Air Mobility) Air Traffic Management field, which is one of the key elements of the UAM market that has not yet bloomed. Air traffic management is an important factor for safe navigation and social acceptance of UAM. In order to realize air traffic management, infrastructure and services based on solid network connectivity must be established. And for industries where connectivity is the core component, it can become an infiltration route for cyber threats. Therefore, cyber security is essential for the infrastructure and services. In detail, we will look into the definition of the existing air traffic management field and the cyber threats. In addition, we intend to identify cyber security threat scenarios that may occur in the newly designed UAM air traffic management infrastructure. Moreover, in order to study the cyber security countermeasures of the UAM air traffic management infrastructure, there will be analysis of the UAM operation concept. As a result, countermeasures applicable to the infrastructure and service fields will be suggested by referring to the cyber security frameworks.

The Images of Fashion Design transmitted by Achromatic Colors (무채색에 의해 전달되는 패션디자인의 이미지)

  • Yune Ji-Yoon;Kim Young-In
    • Journal of the Korean Society of Costume
    • /
    • v.55 no.3 s.93
    • /
    • pp.122-135
    • /
    • 2005
  • The purpose of this study is to classify achromatic color images adopted by contemporary fashion design in order to analyze the links between achromatic color images and fashion images. To this end, the study on the images of achromatic colors of White, grey, and black was conducted by reviewing related documents. In order to analyze the image factors affecting contemporary fashion design, the documents related to fashion history were consulted and in the case of fashion design factors and images, fashion looks using achromatic color as a main theme were referred. The results of this study are as follows : 1. An achromatic color is cold, calm and plain as well as modern. At the same time, it is abstinent and solemn so the color has been mainly used as religious garment. 2. An achromatic color used in apparels has been influenced by the developments of culture, art, society, ideology, politics, economy, science and technology. Black dress was introduced by Art Deco colors, little black dress by feminism, white by the popularity of sports, black becomes more popular by nihilistic beat and punk generations, moon look and cyber punk look were introduced for the advancement of science. Other apparel looks using the color are modern look, feminine look, futuristic look, mannish look, sportive look, and avant-garde look.

Avatar Application for Fashion Cyber Education - Focused on Optical Illusion of Design Elements according to Body Shapes - (패션 사이버 교육(敎育)을 위한 아바타 제작(製作)및 활용(活用) - 체형(體型)에 따른 디자인요소(要素)의 착시효과(錯視效果)를 중심(中心)으로 -)

  • Lim, Hyun-Jung;Park, Hye-Won
    • Journal of Fashion Business
    • /
    • v.9 no.4
    • /
    • pp.1-15
    • /
    • 2005
  • Interesting education which utilizes cyber visual and audio multimedia effects, we regard it as a very effective education but those programs are not prepared yet. So, the purpose of this research is to provide a new direction for cyber fashion education with the use of avatars as the multimedia factor to increase student's interest and understanding. First, we investigated the present situation of fashion cyber education and the present avatar usage situation online, and also we searched literature and the internet to investigate the general theory of design. Second, we used Adobe photoshop 7.0 to make avatars, then, we used Macromedia Flash MX to design the avatar on our web site, and to make it look more realistic. According to the research results, cyber fashion education is usually used as marketing in certain areas, and for middle school, and high school students it is mainly used as text and lecture videos. When searching for fashion sites that use avatars, we found that most fashion shopping malls use them. Because avatars can give visual effects and also increase interest and fun, they can increase concentration and understanding and can be effective in fashion cyber education.

Sharing the Cyber Threat Intelligence on Cyber Crises: The Appropriate Role of the National Intelligence Agency (사이버위기에 대응하기 위한 국가정보기관의 사이버위협정보 공유 역할에 대한 고찰)

  • Kim, Daegeon;Baek, Seungsoo;Yoo, Donghee
    • Journal of Digital Convergence
    • /
    • v.15 no.6
    • /
    • pp.51-59
    • /
    • 2017
  • The role of government is to defend its lands and people from enemies. The range of that defense has now extended into the cyber domain, regarded as the fourth domain of the conventional defense domains (i.e., land, sea, sky, and universe). Traditionally, a government's intelligence power overrides that of its civilians, and government is exclusively responsible for defense. However, it is difficult for government to take the initiative to defend in the cyber domain because civilians already have a greater means for collecting information, which is known as being "intelligence inverse" in the cyber domain. To this end, we first define the intelligence inverse phenomenon and then analyze its main features. Then we investigate foreign countries' efforts to overcome the phenomenon and look at the current domestic situation. Based on these results, we describe the appropriate role of the National Intelligence Agency to handle cyber threats and offer a cyber threat intelligence model to share with civilians to help protect against these threats. Using the proposed model, we propose that the National Intelligence Agency should establish a base system that will respond to cyber threats more effectively.

Maritime Cyber Security Issues and Risk Management Trends (해양 사이버 보안사고 및 위험 관리 사항 동향)

  • Dong-Woo Kang;Ki-Hwan Kim;Young-Sil Lee
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.4
    • /
    • pp.209-215
    • /
    • 2022
  • The International Maritime Organization, which is in charge of the international maritime environment and ship safety, has rapidly promoted cyber systems for international dimension agreement and efficiency improvement and improved nautical efficiency. Nevertheless, maritime cyber system attacks still occur every year, and in particular, the number of international maritime cyber security incidents in 2021 appeared to increase sharply compared to 2020. This paper discusses the areas that should be taken into account in order to reduce the increasing sophistication of maritime cyber security. To this end, we will look at typical cases of cyber attacks that have increased sharply in 2021 and analyze the causes of the continuous occurrence of maritime cyber security incidents. In addition, we present several cyber system proposals regarding the current state of maritime cyber systems and the solutions to the problems they face, as well as the matters to be addressed for future maritime cyber systems that will be advanced.