• Title/Summary/Keyword: Cyber world

Search Result 374, Processing Time 0.019 seconds

Framework Based Smart City Cyber Security Matrix (프레임워크 기반 스마트시티 사이버 보안 메트릭스)

  • Kim, Sung-Min;Jung, Hae-Sun;Lee, Yong-Woo
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.23 no.2_2
    • /
    • pp.333-341
    • /
    • 2020
  • In this paper, we introduce a smart city-cyber-security-grid-matrix methodology, as a result of research on overall cyber security of smart cities. The identified cyber security risks that threaten smart cities and smart-city-cyber-security-threat list are presented. The smart-city-cyber-security-requirements necessary to secure the smart city cyber security with the developed smart city-cyber-security-grid-matrix are given in this paper. We show how the developed smart city-cyber-security-grid-matrix methodology can be applied to real world. For it, we interlocked the developed smart city-cyber-security-grid-matrix methodology with the cyber-security-framework of the National Institute of Standards and Technology, and developed a framework-based smart city-cyber-security-grid-matrix. Using it, it is easy and comfortable to check the level of cyber security of the target smart ciy at a glace, and the construction and operation of the smart city security system is systematized.

North Korean Cyber Warfare Threat and South Korean Action (북한의 사이버전 위협분석과 대응방안 고찰)

  • Kim, Doo-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.1-10
    • /
    • 2014
  • In this study, I analyzed the increased threat of cyber warfare and the threat of reality about what is happening around the currently. And to prepare for it, I proposed the fact how main developed countries deal with cyber warfare. Also, I presented North Korea's cyber warfare threat which is equipped with world's top 3 cyber warfare performance and the way how their strategy influence to South Korea's national security. Moreever, I studied the existing North Korea's cyber warfare threat and the way how, how South Korea deal with it and prepare to against expected threat of cyber warfare in future.

How Does the Internet Audience Participate in Cyber Spare and Constitute Cyber Culture? (인터넷 수용자의 참여방식과 문화적 생산 -<여인천하> 게시판 분석-)

  • Joo, Chang-Yun
    • Korean journal of communication and information
    • /
    • v.19
    • /
    • pp.265-294
    • /
    • 2002
  • The purpose of this study is to explore the way in which the internet audience constitutes cyber culture by analysing a bulletin board system(BBS) on a historical drama, 'The World of Women'(SBS). Research findings show that the internee audience participates in a cyber space by five manners; personal participation(18.9%), critique of broadcaster's policy(11.3%), participation in a television drama community(42.1%), co-authorship(6.4%), evaluation and interpretation(21.3%). Through these kinds of participant activities, the internee audience tends to constitute a new cyber culture. Firstly, the audience seems to read 'The World of Women' by a specific way. It is the interest of a Um court lady that is characteristic on BBS of 'The World of Women'. Secondly, the internet audience constructs a new community of meaning by means of using emoticon(emotion and icon), deconstructing grammar, and remaking new signs. Thirdly, the internet audience argues their power over drama production, in other words, their ownership over the drama. Fouthly, the audience actively protests and criticise the policy of the broadcaster, especially charged service. Finally, the internet audience is likely to enjoy writing itself as a fun.

  • PDF

Research on Cyber-terrorism preparation scheme (사이버테러 대응방안에 관한 연구)

  • Kim, Yeon Jun;Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.33-42
    • /
    • 2016
  • While evolving information-oriented society provides a lot of benefits to the human life, new types of threats have been increasing. Particularly, cyber terrorism, happen on the network that is composed of a computer system and information communication network, and the mean and scale of damage has reached a serious level. In other words, it is hard to locate cyber terror since it occurs in the virtual space, not in the real world, so identifying "Who is attacking?" (Non-visibility, non-formulas), or "Where the attack takes place?" (trans-nation) are hard. Hackers, individuals or even a small group of people, who carried out the cyber terror are posing new threats that could intimidate national security and the pace and magnitude of threats keep evolving. Scale and capability of North Korea's cyber terrorism are assessed as world-class level. Recently, North Korea is focusing on strengthen their cyber terrorism force. So improving a response system for cyber terror is a key necessity as North Korea's has emerged as a direct threat to South Korean security. Therefore, Korea has to redeem both legal and institutional systems immediately to perform as a unified control tower for preemptive response to cyber terrors arise from North Korea and neighboring countries.

Intrinsic and Extrinsic Factors Impacting Individuals' Cyber Ethics Awareness and Behavior Intention (사이버윤리 준수인식과 행동의도에 영향을 미치는 사용자의 내·외적요인)

  • Kim, Sanghyun;Park, Hyunsun
    • The Journal of Information Systems
    • /
    • v.23 no.1
    • /
    • pp.111-138
    • /
    • 2014
  • As the Internet is widely used worldwide, Cyber world has become a part of daily life. On the other hand, the adverse effects of Internet, such as abusive comments, illegal harmful contents, rumor diffusion, infringement on a right have emerged with the increase. Researchers recognized the important of cyber ethics as an effective means of coping with the adverse effects on Internet. But, Little empirical research has been related to cyber ethics in management information systems. Thus, the purpose of this research is to identify multidimensional motivation factors that cyber ethics awareness and compliance behavior Intention. For this, this study investigated the factors that might influence Internet users to compliance cyber ethics. Using university students as a sample, one hundred and ninety six are collected for further analysis. The results of this study are as follows; First, self-esteem, Moral Obligation, self-control, cyber ethics education and Social Influence are significantly related to cyber ethics awareness, while punishment is not significantly related. Second, cyber ethics awareness have a positive effect on cyber ethics compliance behavior Intention. Third, the moderating effect of ego strength is also significant. This study is significant in that it established a behavior model to understand the compliance of cyber ethics with internet user in Korea.

Issues and Tasks of Personal Information Protection Liability Insurance (개인정보 손해배상책임 보장제도의 쟁점과 과제)

  • Lee, Suyeon;Kwon, Hun-Yeong
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.37-53
    • /
    • 2020
  • Today, our society is exposed to cyber threats, such as the leakage of personal information, as various systems are connected and operated organically with the development of information and communication technology. With the impact of these cyber risks, we are experiencing damage from the virtual world to the physical world. As the number of cases of damage caused by cyber attacks has continued to rise, social voices have risen that the government needs to manage cyber risks. Thus, information and telecommunication service providers are now mandatory to have insurance against personal information protection due to amendment of "the Act on Promotion of Information and Communication Network Utilization and Information Protection". However, the insurance management system has not been properly prepared, with information and communication service providers selecting the service operators based on sales volume rather than selecting them based on the type and amount of personal information they store and manage. In order for the personal information protection liability insurance system to be used more effectively in line with the legislative purpose, effective countermeasures such as cooperation with the government and related organizations and provision of benefits for insured companies should be prepared. Thus, the author of this study discuss the current status of personal information protection liability insurance system and the issues raised in the operation of the system. Based on the results of this analysis, the authors propsoe tasks and plans to establish an effective personal information protection liability insurance system.

Countermeasures against Cyber terror in Korea (사이버테러의 현황과 대책에 관한 연구)

  • An, Chang-Hoon
    • Korean Security Journal
    • /
    • no.5
    • /
    • pp.211-241
    • /
    • 2002
  • Koreans are the most avid Internet surfers in the world according to Nielson/NetRatings(Reuters, August 2001) and most Internet connections are made through high-speed connections like Digital Subscriber Lines (DSLs). The result of such internet fervor is a nation that is fertile in both hackers and software companies(over 200 in the field of network security alone). However, by-product of Internet activity is cyber crime and the need to protect innocent users from the dangers of cyber criminals and cyber-terrorists be they are individuals or organized groups. Hence the Cyber Terror Response Team (CTRT) was organized in late 2000 with the mandate to fulfill that role. In these contexts, this study analyzes the actual conditions of cyber terror and suggests the countermeasures against cyber terror in Korea.

  • PDF

The Study of Web-tool for Scholarly Discussion and Publishing : The Case of KIPS Cyber Forum (WWW에서의 학술토론과 출판에 관한 연구 - KIPS의 사례를 중심으로 -)

  • 김재관
    • Journal of Korea Technology Innovation Society
    • /
    • v.2 no.1
    • /
    • pp.44-57
    • /
    • 1999
  • KIPS is a net-world, cyberspace for scholars in Public Administration and Policy Sciences in WWW. All knowledge-intensive work has its core the publishing and debating of document. We have created a cyber forum for that work KIPS Cyber Forum has adapted ‘D3E’, the web-tool kit for non-technical users to easily debate and publish documents that exploit to the full networked interactive web media. And, for real-time communication, we added it the voice conferencing system. KIPS has opened Cyber Forum service in November 1998. The visitors on KWS Cyber Forum are increasingly growing, but the participants on the debate are a few. This means that the problems of Cyber Forum Service are not technical, but participation. The result imply that, at now, high participation of scholars on the debate is needed, at first, by the detailed guides for internet, www and relevant technical information. After that more expertly designed interface is to be important.

  • PDF

GIS Viewed from Oriental Philosophical Perspective (동양사상으로 재조명한 GIS)

  • 김영표
    • Spatial Information Research
    • /
    • v.8 no.2
    • /
    • pp.183-189
    • /
    • 2000
  • According to Oriental perspective on Universe, all systems become complete when three elements namely time, space, and human are all present. The only computer technology which can integrate these three elements is GIS. The current GIS database and system architecture, however, mainly concentrate on managing and analyzing spatial data without considering temporal and human elements. Despite the limitations, it is certain that GIS technology will develop into a unity within which the three elements of time, space and human are integrated. On the other hand, with the rapid acceptance of Internet technology, a new small universe that can be called "cyber world" is emerging. However, the current small univers created by internet is only a half-universe which does not include the concept of space. The creation of "cyber nation" which truly reflects our living environment in computer and information communication networks can only be achievedthrough the integration of GIS and Internet. Currently, many countries are heavily investing in GIS. Based on the magnitude of investments, we can expect that the concept of "cyber nation" will further develop into "cyber world" where the search for information on any part of global village is possible with the simple use of mobile phone regardless of time or location. If so, it might be possible to create a "Digitopia", a digital utopia in cyber space. A new world is opening by the integration of GIS and Internet.is opening by the integration of GIS and Internet.

  • PDF

Strategies for Cyber Territory Construction (사이버국토 구축전략에 관한 연구)

  • 김영표;한선희
    • Spatial Information Research
    • /
    • v.10 no.1
    • /
    • pp.1-14
    • /
    • 2002
  • Due to the rapid development in information technology, countries of advanced information technology and multi-national information communication industries have expanding their invesment in constructing a cyber territory or a cyber city, and even a cyber globe that combines the real world with the cyber world. As such, in order to keep up with the competition with other countries to secure the Invisible Continent, Korea cannot afford to fall behind in the preparation and efforts to construct a cyber territory. Therefore in preparation for the inevitable establishment of a cyber territory, this study defined the concept of a cyber territory clearly and proposed a promotional strategy needed by the government for the establishment of a cyber territory. A cyber territory is 'the dynamic second territory that realizes various values in various aspects through organically combining innumerable active bodies in a surreal space and that are created by systematically and optimally connecting the physical topographical space and activity of the first nation to the cyberspace'. To explain further, a cyber territory is defined as another simulated space not only to manage the land systematically and deal with administrative services far the greater population, but also to contain economic activities of corporations and the citizens' everyday lives in a virtual reality by digitizing the entire territory including even the sea. In order to establish such cyber territory, it is necessary to revise related laws and policies, to foster related technology and industry as a main engine for national development, to promote public awareness, and to train related human resources.

  • PDF