• Title/Summary/Keyword: Cyber world

Search Result 374, Processing Time 0.023 seconds

A Study on the Electronic Money's present situation & after development direction at Electronic Commerce's times (EC시대(時代) 전자화폐(電子貨幣)의 현황(現況)과 향후(向後) 개발방향(開發方向)에 관한 소고(小考))

  • Park, Young-Tae
    • International Commerce and Information Review
    • /
    • v.1 no.1
    • /
    • pp.227-251
    • /
    • 1999
  • The realization of the Internet and Electronic Commerce through the progress development of the information & communication has changed the transition of the financial settlement system all of the world. And Electronic Commerce has becoming the most important tools to decide the value from the real money, existing bills, coins to the Electronic Money. Electronic Money is very useful materials with Electronic Wallet at cyber times in the future. So that reason, I studied Electronic Money's present situation & after development direction in Korea. And the purpose of this paper is to introduce Electronic Money's modem definition and to analysis the common use situation, operation at home and abroad at Electronic Commerce times. In add to investigated advanced countries Electronic Money utilization and drawed out current events point. So I suggest to this like point, in honour of Electronic Money's common use in Korea. First to establish universality. Second, to make various terminals and the powerful networking structure. Third, to establish stability. Fourth, renovating the system goes side by side. Futhermore, to develop Electronic Money's, it is necessary to make skilled labour and to learn foreign advanced technology.

  • PDF

Development of Korean Cybersecurity Goods Menu (Korean Cybersecurity Goods Menu 개발)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.266-267
    • /
    • 2015
  • The information security (information security knowledge) industry is technology-intensive, high value-added industries. South Korea's response has excellent ICT skills and experience and skills in a variety of cyber attacks, has become a benchmark in the world. However, the small size of the domestic information security company, supporting infrastructure is lacking. Domestic information security industry is the primary condition to activate the export. In order to export it is necessary to develop for the Korean Cybersecurity Goods Menu for products, services and technologies of the domestic information security industry. Buyer Menu as well as foreign and domestic Seller, companies and governments know the details of the assets and product information security industry and is a prerequisite to sell. In this paper, I study the Korean Cybersecurity Goods Menu development.

  • PDF

A Study on the Evaluation Consulting Methodology of Important Information Communication Base Facility (주요 정보통신기반시설의 평가컨설팅 방법론에 대한 연구)

  • Lee, Young-Ro;Cho, Jae-Wan
    • Journal of Digital Convergence
    • /
    • v.5 no.1
    • /
    • pp.55-68
    • /
    • 2007
  • It soaks but 2001 July information communication base step law enforcement and the Enforcement Ordinance are published to follow, in order to support the establishment of evaluation and protective measure in order the vulnerability analysis against the facility of the agency which manages an important information communication base hour opinion to designate information protection specialty enterprise. As information protection specialty enterprise being revealed evacuation laboratory back 12 enterprises from information communication department become designation as the consulting enterprise and they do an enterprise activity actively. It follows in diffusion of the IT and information reconciliation level the other side where our country belongs in the world-wide first group, the research against the disfunction plan of preparation comparison the fact that law it is come negligently all actuality. The network as it will give management coat fatal effect even at obstacle occurrence hour of instant for of case and IT facility of the cyber transactions which leads, in the future there to be to corporate management, there is a possibility the stable civil official of information Facilities for communications very seeing in the portion which is important. Present condition and important propulsion contents of information communication base step law enforcement after, against a vulnerability analysis of information protection relation field and evaluation consulting methodological application situation to sleep it researches from the dissertation which it sees consequently and it does.

  • PDF

Study on the System Implementation for a Reliable Auction Right Analysis System with a Focus on Commercial Zone Analysis (상권분석시스템을 통한 신뢰성 기반의 상가건물 권리분석 프로그램 개발에 관한 연구)

  • Kim, Sangbeom
    • Journal of Digital Contents Society
    • /
    • v.16 no.5
    • /
    • pp.767-773
    • /
    • 2015
  • This study suggests a reliable auction right analysis system that improves the existing auction right analysis in a sense that the system is more applicable to a real economic world. The existing study has used an auction successful bidding price rate and an auction successful contract price for its estimation of the auction right analysis. But in this paper the degree of market vitality which is provided from the commercial zone analysis is used as an input variable so the expected auction price can be estimated and the auction right analysis is conducted in that manner.

A Study on the System for Controlling Factory Safety based on Unity 3D (Unity 3D 기반 깊이 영상을 활용한 공장 안전 제어 시스템에 대한 연구)

  • Jo, Seonghyeon;Jung, Inho;Ko, Dongbeom;Park, Jeongmin
    • Journal of Korea Game Society
    • /
    • v.20 no.3
    • /
    • pp.85-94
    • /
    • 2020
  • AI-based smart factory technologies are only increase short-term productivity. To solve this problem, collaborative intelligence combines human teamwork, creativity, AI speed, and accuracy to actively compensate for each other's shortcomings. However, current automation equipmens require high safety measures due to the high disaster intensity in the event of an accident. In this paper, we design and implement a factory safety control system that uses a depth camera to implement workers and facilities in the virtual world and to determine the safety of workers through simulation.

A Comprehensive Analyses of Intrusion Detection System for IoT Environment

  • Sicato, Jose Costa Sapalo;Singh, Sushil Kumar;Rathore, Shailendra;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.975-990
    • /
    • 2020
  • Nowadays, the Internet of Things (IoT) network, is increasingly becoming a ubiquitous connectivity between different advanced applications such as smart cities, smart homes, smart grids, and many others. The emerging network of smart devices and objects enables people to make smart decisions through machine to machine (M2M) communication. Most real-world security and IoT-related challenges are vulnerable to various attacks that pose numerous security and privacy challenges. Therefore, IoT offers efficient and effective solutions. intrusion detection system (IDS) is a solution to address security and privacy challenges with detecting different IoT attacks. To develop an attack detection and a stable network, this paper's main objective is to provide a comprehensive overview of existing intrusion detections system for IoT environment, cyber-security threats challenges, and transparent problems and concerns are analyzed and discussed. In this paper, we propose software-defined IDS based distributed cloud architecture, that provides a secure IoT environment. Experimental evaluation of proposed architecture shows that it has better detection and accuracy than traditional methods.

The Value Formation of Digital Image by Users' Interaction in Online Games (온라인게임에서 사용자 인터랙션에 의한 디지털 이미지의 가치 형성에 관한 연구)

  • Yoo Wang-Yun
    • Journal of Game and Entertainment
    • /
    • v.2 no.2
    • /
    • pp.17-24
    • /
    • 2006
  • Online games take place by the interactions among users and their contents change endlessly with their organic characteristics. Especially, digital images that make a great impact on game play such as characters or items form their own value beyond the establishment scope of their designer even outside of the game world. The users who pay fees for using them establish the concept of possession for the images and information designed in the games. Then, business transactions are formed among them who are in agreement with their values and their possession rights can be changed. In this way, digital images in the online games form new values by the interaction among other users or game systems. Meanwhile, the more the interaction and a sense of solidarity in the community increase, the higher their value becomes.

  • PDF

An Open Standard-based Terrain Tile Production Chain for Geo-referenced Simulation

  • Yoo, Byoung-Hyun
    • Korean Journal of Remote Sensing
    • /
    • v.24 no.5
    • /
    • pp.497-506
    • /
    • 2008
  • The needs for digital models of real environment such as 3D terrain or cyber city model are increasing. Most of applications related with modeling and simulation require virtual environment constructed from geospatial information of real world in order to guarantee reliability and accuracy of the simulation. The most fundamental data for building virtual environment, terrain elevation and orthogonal imagery is acquired from optical sensor of satellite or airplane. Providing interoperable and reusable digital model is important to promote practical application of high-resolution satellite imagery. This paper presents the new research regarding representation of geospatial information, especially for 3D shape and appearance of virtual terrain. and describe framework for constructing real-time 3D model of large terrain based on high-resolution satellite imagery. It provides infrastructure of 3D simulation with geographical context. Web architecture, XML language and open protocols to build a standard based 3D terrain are presented. Details of standard-based approach for providing infrastructure of real-time 3D simulation using high-resolution satellite imagery are also presented. This work would facilitate interchange and interoperability across diverse systems and be usable by governments, industry scientists and general public.

Are Online and Offline Delinquency Mutually Exclusive? Blurred Boundaries between Cyber Space and the Real-World

  • Ko, Nayoung;Hong, Myeonggi;Hwang, Jeeseon;Chang, Jeonghyeon;Hwang, EuiGab
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.3048-3067
    • /
    • 2021
  • This study examines the similarities and differences between the causes of juvenile delinquency in online and offline environments and in personal characteristics. The study utilizes data from the '2014 Survey on Juvenile Victimization in Korea'. The population of this survey is students attending middle and high schools across the country. While this paper is based on the Self-Control theory, opportunity factors based on the Routine Activity theory and the Situational Action theory are also applied. Results show that the causes of offline delinquency are low self-control, routine activity and frequent gaming and SNS use. The causes of online delinquency are high self-control, existence of communication with unknown persons and the spectrum of personal information online. The common element of offline and online delinquency was the presence of delinquent peers. These results show that while online and offline delinquency cannot be explained with the same methodology, at the same time they are not mutually exclusive.

Analysis of the Trends of Domestic/International IT Product Introduction Policy and Deduce Improvement Plan of Domestic Policy (국내외 IT제품 도입제도 동향 분석 및 국내 제도 개선방안 도출)

  • Son, Hyo-hyun;Kim, Kwang-jun;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.897-906
    • /
    • 2019
  • As the Information and Communication Technology developed, the administration computerization of the government was promoted, and cyber attacks targeting IT products are spreading all over the world due to the reverse functions. Accordingly, governments in each country have begun to verify the security in the introduction of IT products by national and public institutions in order to protect information, and established the policy required in the introduction process. This research analyzes the introduction policy of domestic IT products to identify the supplement point. In addition, we analyze trends of introduction of IT products in the major developed countries such as USA, UK, Japan, Canada, and Australia. Finally, we propose the improvement method of domestic introduction policy through comparison analysis with domestic introduction policy.