• Title/Summary/Keyword: Cyber world

Search Result 374, Processing Time 0.022 seconds

Networked Creativity on the Censored Web 2.0: Chinese Users' Twitter-based Activities on the Issue of Internet Censorship

  • Xu, Weiai Wayne;Feng, Miao
    • Journal of Contemporary Eastern Asia
    • /
    • v.14 no.1
    • /
    • pp.23-43
    • /
    • 2015
  • In most of the world, the current trend in information technology is for open data movement that promotes transparency and equal access. An opposite trend is observed in China, which has the world's largest Internet population. The country has implemented sophisticated cyber-infrastructure and practices under the name of The Golden Shield Project (commonly referred to as the Great Firewall) to limit access to popular international web services and to filter traffic containing 'undesirable' political content. Increasingly, tech-savvy Chinese bypass this firewall and use Twitter to share knowledge on censorship circumvention and encryption to collectively troubleshoot firewall evasion methods, and even mobilize actions that border on activism. Using a mixed mythological approach, the current study addresses such networked knowledge sharing among citizens in a restricted web ecosystem. On the theoretical front, this study uses webometric approaches to understand change agents and positive deviant in the diffusion of censorship circumvention technology. On policy-level, the study provides insights for Internet regulators and digital rights groups to help best utilize communication networks of positive deviants to counter Internet control.

Understanding Current Issues in Research and Education in Science and Technology: A Framework of Knowledge and Action Sharing between Universities and Science and Technology Parks

  • Fernandez, Ramon Emilio;Ferguson, David L.
    • World Technopolis Review
    • /
    • v.6 no.1
    • /
    • pp.2.1-2.9
    • /
    • 2017
  • Humanity is experiencing a very fast-paced technological evolution. As technological systems evolve exponentially, societies are becoming more global and are starting to have impacts beyond their geographic demarcations. This implies that, the actions of a person who is across the ocean from where we live could have significant impacts on our everyday lives. This article explores the complexity of globalization, identifies a number of global issues, and looks at the University and the Science and Technology Parks as potential sources of human capital to tackle current and forthcoming global challenges, ranging from new energy sources to potable water distributions. The article focuses on current efforts that are taking place across universities and science and technology parks around the world. We propose a new methodology whereby interdisciplinary work can inform the development of multidisciplinary approaches to solve some of the most complex global issues such as cyber security and educating the next generations of global leaders, providing them them with the necessary skills to be successful in a globally distributed workforce.

Deep compression of convolutional neural networks with low-rank approximation

  • Astrid, Marcella;Lee, Seung-Ik
    • ETRI Journal
    • /
    • v.40 no.4
    • /
    • pp.421-434
    • /
    • 2018
  • The application of deep neural networks (DNNs) to connect the world with cyber physical systems (CPSs) has attracted much attention. However, DNNs require a large amount of memory and computational cost, which hinders their use in the relatively low-end smart devices that are widely used in CPSs. In this paper, we aim to determine whether DNNs can be efficiently deployed and operated in low-end smart devices. To do this, we develop a method to reduce the memory requirement of DNNs and increase the inference speed, while maintaining the performance (for example, accuracy) close to the original level. The parameters of DNNs are decomposed using a hybrid of canonical polyadic-singular value decomposition, approximated using a tensor power method, and fine-tuned by performing iterative one-shot hybrid fine-tuning to recover from a decreased accuracy. In this study, we evaluate our method on frequently used networks. We also present results from extensive experiments on the effects of several fine-tuning methods, the importance of iterative fine-tuning, and decomposition techniques. We demonstrate the effectiveness of the proposed method by deploying compressed networks in smartphones.

Development of an Educational Java Applet for Understanding Fuzzy Logic Controller (퍼지 논리 제어기의 이해를 위한 교육용 자바 애플릿의 개발)

  • Kim Dong-Sik;Seo Sam-Jun;Kim Yoon-Bae
    • Journal of Engineering Education Research
    • /
    • v.3 no.1
    • /
    • pp.21-26
    • /
    • 2000
  • The World Wide Web provides new opportunities for cyber education over the Internet. The web, when combined with other network tools, can be used to provide useful educational information to learners. Thus, the objective of this paper is to develop Java applet for understanding the concept of Fuzzy Logic Controller (FLC) on the Internet. The developed Java Applet is composed of four frames: fuzzifier, rulebase, inference engine and defuzzifier. Since data transmission can be achieved from one frame to other frames, users can easily observe and understand the process of FLC. The results of this paper can be used to improve the efficiency of lectures in the cyber university.

  • PDF

Analysis of Personal Information Protection System in Korea - Focus on Certification & Evauation System and Personal Identification Number - (우리나라의 개인정보 보호제도 분석 - 인증 및 평가제도와 개인식별번호를 중심으로 -)

  • Kim, Min-Chen
    • Informatization Policy
    • /
    • v.23 no.4
    • /
    • pp.38-58
    • /
    • 2016
  • The ever-evolving Internet environment along with changes in the mass media has been creating a new way of communicating in the virtual cyber world. The Internet users have more services at their disposal to communicate with ease. Such a new way of communication styles, however, makes them vulnerable to personal information leakage, increasing the concerns of cyber security. A thorny issue is how we can control the disclosure of personal information. Lately, the Korean government implemented privacy policies to resolve and prevent personal information leakage incidents that incur social problems. Here, we seek to identify problems in the privacy policies for better solutions.

Security Analysis of AMI Using ACT (ACT를 이용한 AMI 보안 분석)

  • Wi, Miseon;Kim, Dong Seong;Park, Jong Sou
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.639-653
    • /
    • 2013
  • Smart grid is a network of computers and power infrastructure that monitor and manage energy usage efficiently. Recently, the smart grid demonstration projects around the world, including the United States, Europe, Japan, and the technology being developed. The protection of the many components of the grid against cyber-threats has always been critical, but the recent Smart grid has been threatened by a variety of cyber and physical attacks. We model and analyze advanced metering infrastructure(AMI) in smart grid. Using attack countermeasure tree(ACT) we show qualitative and probabilistic security analysis of AMI. We implement using SHARPE(Symbolic Hierarchical Automated Reliability and Performance Evaluator) tool and calculate probability, ROA, ROI, Structure Importance, Birnbaum Importance.

GOVERNMENT-CIVIC GROUP CONFLICTS AND COMMUNICATION STRATEGY: A TEXT ANALYSIS OF TV DEBATES ON KOREA'S IMPORT OF U.S. BEEF

  • Cho, Seong Eun;Choi, Myunggoon;Park, Han Woo
    • Journal of Contemporary Eastern Asia
    • /
    • v.11 no.1
    • /
    • pp.1-20
    • /
    • 2012
  • This study analyzes messages from Korean TV debates on the conflict over U.S. beef imports and the process of negotiations over the imports in 2008. The authors have conducted a content analysis and a semantic network analysis by using KrKwic and CONCOR. The data was drawn from nine TV debates aired by three major TV networks in Korea (MBC, KBS, and SBS) from 27 April 27 2008 to 6 July 2008. The results indicate substantial differences in the semantic structure between arguments by the government and those by civic groups. We also investigated the relationship between the terms frequently used by both sides (i.e., the government and civic groups), and the terms used exclusively by one side. There was a gradual increase in the number of terms frequently used by both sides over time, from the formation of the conflict to its escalation to its resolution. The results indicate the possibility of general agreement in conflict situations.

Cyber Shopping Mall Design and Implementation using Intelligent Sale Agent (지능형 판매에이전트를 이용한 사이버쇼핑몰 설계 및 구현)

  • 피수영;정환묵
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.10 no.5
    • /
    • pp.497-505
    • /
    • 2000
  • Today people are very interested in an electronic commerce based on web according to the rapid growth of Internet and multimedia technology. Buyers want the special services for themselves as they become more reasonable, wiser and deepening the tendency of personality. But today most electronic commerce only serves the catalog of goods which buyers see and choose shapes and standards of goods. It is needed sale agent using sale clerks' knowledge beyond the level of service only offering the information about goods to satisfY buyers. So in this thesis buyers can buy the goods suiting buyers' taste using ISA(lntelligent Sale Agent), sale clerks in cyber in place of sale clerks in actual shops in real world. The use of this kind of intelligent sale agent makes buyers save the time for searching for goods and do shopping suiting buyers' taste.

  • PDF

Study on Security Measures of e-Gov with Dynamic ICT Ecosystem (동적인 ICT 생태계에 따른 전자정부 보안대책 연구)

  • Choung, Young-Chul;Bae, Yong-Guen
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1249-1254
    • /
    • 2014
  • As ICT ecosystem changes, security-related threat on individuals and corporations has increased. With the recent sophistication of hacking strategy, hacking serves commerce and its scale becomes larger than ever. Accordingly, the analysis on cyber intrusion is required. As a number one electronic government around the world, the government's role for security solution for realization of safe electronic government. This manuscript analyzes cyber intrusion cases, speculates the government's measures and suggests political recommendation for the current phenomena.

A Consideration for Intellectual Property Rights under Digital Environments (전자상거래에서의 지적재산권에 관한 문제점과 개선방안)

  • Kwon, Sang-Ro
    • International Commerce and Information Review
    • /
    • v.6 no.1
    • /
    • pp.249-265
    • /
    • 2004
  • In the current digital age, most of the countries in the world recognize the electronic business to be a very prospective area in the future and plan to activate for the preoccupation of the business. As a result, this led a rapid increase of the electronic business volume. Electronic business takes place in the cyber space, using internet. However, the intellectual property rights have a high degree of possibility of being infringed as the digitalized intellectual property is easy to receive, copy and transmit in the cyber space. The language structure on the web, represented by HTML, makes easier to copy the intellectual property. And, as the internet has no national boundary, the infringement of the intellectual property rights is easier regardless of country, which could lead to the commercial disputes between the concerned countries. There are in fact many legal disputes nowadays on the infringement of the intellectual property rights in such field as computer programming, infringement of the copyright, business model patent and infringement of the trademark right on the registered name of the domain. It is, therefore, time now to prepare a new theory or legal system to protect the intellectual property rights on copyright, patent and trademark right so as to comply with the digital environment together with such a splendid growth of "electronic business." USA and Germany are nowadays making a significant movement on the legislation of the electronic business, and this study will focus on the legislative contents, judicial precedents and interpretation of law in the above countries.

  • PDF