• Title/Summary/Keyword: Cyber world

Search Result 374, Processing Time 0.021 seconds

A Study on the Counter-Measures for International Events through the Case Studies and Its Implications for Counter-Terrorism Policy (국제 행사에 대한 테러대응 사례분석과 정책적 함의)

  • Park, Dong-Kyun;Shin, Ik-Chu
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.161-179
    • /
    • 2007
  • The numerous definition of terrorism is viewed as the use of force or violence by individual or group that is directed toward civilian populations and intended to instill fear as a means of coercing individuals or groups to change their political or social positions. Recently, the paradigm of terror has been developed as new terrorism motivated by 9. 11 terror in 2001. In these contexts, this study analyzed the case study of recent counter-terrorism of international events and suggested the policy implications. This study is split into four chapters. Chapter I is the introduction part. Chapter II introduces the reader to new terrorism theory, and Chapter III deals with the case study of the international counter-terrorism policy around the world, Chapter IV deals with the policy implications of the case study. The greater the political, economical and social advantages opening large international ceremonies, the larger the probability of being targets for terrorists and criminals. As terrorism is one of the important issue, the security problems at international ceremonies in Korea, rising country as political essence in Asian-Pacific region, become very important. With experienced know-hows against terror and preparations for security, local and central governments must promote the private security companies filling up vacancies of police and official security system and develop international ceremonies, rising high valuable industries in 21st century, with diplomatic efforts. International major events is the largest event related events with politics, economy, culture, and such large-scale events should be a comprehensive counterplan in the light of safety check for the location of a hazard and safety check of facilities in and out, attendance on athlete and visitor and escort of VIPs.

  • PDF

Effect of Emotional Elements in Personal Relationships on Multiple Personas from the Perspective of Teenage SNS Users (SNS 상의 대인관계에서 나타나는 감정적 요소와 청소년의 온라인 다중정체성 간의 영향관계)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.18 no.2
    • /
    • pp.199-223
    • /
    • 2016
  • As social networking services (SNS) become widely used tools for maintaining social relationships, people use SNS to express themselves online. Users are free to form multiple characters in SNS because of online anonymity. This phenomenon causes SNS users to easily demonstrate multiple personas that are different from their identities in the real world. Therefore, this study focuses on online multi-personas that establish multiple fake identities in the SNS environment. The main objective of this study is to investigate factors that affect online multi-personas. Fake online identities can have various negative consequences such as cyber bullying, cyber vandalism, or antisocial behavior. Since the boundary between the online and offline worlds is fading fast, these negative aspects of online behavior may influence offline behaviors as well. This study focuses on teenagers who often create multi-personas online. According to previous studies, personal identities are usually established during a person's youth. Based on data on 664 teenage users, this study identifies four emotional factors, namely, closeness with others, relative deprivation, peer pressure and social norms. According to data analysis results, three factors (except closeness with others) have positive correlations with users' multi-personas. This study contributes to the literature by identifying the factors that cause young people to form online multi-personas, an issue that has not been fully discussed in previous studies. From a practical perspective, this study provides a basis for a safe online environment by explaining the reasons for creating fake SNS identities.

Evaluating Blockchain Research Trend using Bibliometrics-based Network Analysis (블록체인 분야의 학술연구 동향분석: 계량정보학적 네트워크분석을 중심으로)

  • Zhu, Yu-Peng;Park, Han-Woo
    • Journal of Digital Convergence
    • /
    • v.17 no.6
    • /
    • pp.219-227
    • /
    • 2019
  • This study aims to examine Blockchain research trend using bibliometrics-based network analysis. The data were collected from WoS, Scopus, Korea Citation Index and National science & Technology Information Service, from 2009 to 2018. As results, the number of publications has started increasing rapidly from 2017 and it showed the initial stage of formation of coauthor network. Words often used in the title of the publications were related to application development, controversy and technology development. In addition, the majority of domestic papers are in the subject of social science, while international papers tend to focus on engineering issues. The results of the temporal analysis show that Korean researchers' block chain 3.0 started in 2017 and are rapidly increasing in 2018. The number of citations was associated with publication year in a statistically signifiant way. By examining these research trends, we hope that this paper can be a useful basis for the development of blockchain. Future research is expected to reveal more clearly the knowledge structure and characteristics of blockchain around the world.

Analyses of Impact on Business Performance of Information Security Companies: The Perspective of Mediating Effects of Organizational and Innovative Capabilities (정보보호 기업의 경영성과에 미치는 영향 분석: 조직 및 혁신 역량의 매개 효과의 관점에서)

  • Shin, HyunMin;Kim, Injai
    • Knowledge Management Research
    • /
    • v.22 no.4
    • /
    • pp.157-172
    • /
    • 2021
  • Information security companies were established in earnest from the mid-late 1990s to early 2000s, far shorter than other national key industries. Nevertheless, the information security industry has made rapid progress. It is expected that the proportion of the information security industry will increase rapidly with the development of advanced technology along with the 4th industrial revolution. As COVID-19, which occurred at the end of 2019, spreads around the world in 2020, non-face-to-face services and digital transformation are accelerating, and cyber threats to users are also increasing. However, there are limitations in responding to new Cyber Security threats due to the shortage of information protection manpower, insufficient security capabilities of domestic companies, and the narrow domestic information protection market. This study examines the external environmental factors of information security companies such as government information protection system operation, government influence, government support, partnership between information security companies, and internal environmental factors such as top management support, financial status, human resources, organizational capability, This study was conducted using empirical data to analyze whether it affects innovation capability and whether organizational capability and innovation capability affect financial and non-financial performance. The results of this study can be used as basic data to suggest policies and implications for information security, and to strengthen the competitiveness of the information security industry.

Self-Disclosure and Cyberbullying on SNS (SNS상에서 자기노출과 사이버불링)

  • Jooyeon Won;DongBack Seo
    • Information Systems Review
    • /
    • v.19 no.1
    • /
    • pp.1-23
    • /
    • 2017
  • Since the development of information communication technologies, social networking sites (SNSs) have been diffused to the world with benefits such as building and maintaining relationships among people. SNSs have become more popular with the development of mobile devices. Despite this advantage, SNSs also present unexpected effects on people, such as cyberbullying and identity theft. Cyberbullying has emerged as one of the most serious issues among people who use SNSs. In fact, almost 20% of teenagers confessed that they have been cyberbullied on SNSs. In consideration of this serious social issue, this study investigates the influences of self-disclosure and self-control on the cyberbullying victimization experience from the perspective of Social Exchange Theory. Self-disclosure is a basic characteristic of SNSs. It is classified into self-disclosure for access to SNS and self-disclosure for relationship building and maintaining on SNSs. The cyberbullying victimization experience is classified into being cyber-excluded and being cyber-attacked. We examine how two types of self-disclosure and self-control affect two types of cyberbullying victimization experience based on the survey data of people who are in their 20s and are greatly familiar with SNSs.

A Study on the Curriculum of Department of Information Security in Domestic Universities and Graduate Schools and Comparison with the Needs of Industry Knowledge (국내 대학 및 대학원 정보보호 교육과정 분석 및 산업체 필요 지식과의 관련성 비교)

  • Kim, Min-Jeong;Lee, Haeni;Song, Shin-Jeong;Yoo, Jinho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.195-205
    • /
    • 2014
  • These days cyber attacks are increasing all over the world, and the national critical infrastructure and information network protection has become important. For this reason, the concentrated investment in information security and development of professional human resource are essential, but there is a shortage of information security workforce in Korea. Currently, departments of information security in domestic universities make efforts to develop human resource of information security and have a increasing interest in the curriculum design. So this paper investigates the curriculums of information security in domestic universities and graduate schools. And then, it compares with the needs of industry knowledge and skills by using SPSS. Through this analysis, we will get implications about curriculum design of Information security.

Effects of Green Tea Powder on Bone Markers and Bone Mineral Density in STZ-Induced Diabetic Rats (녹차가루가 당뇨 쥐의 골 대사 지표 및 골밀도에 미치는 영향)

  • Choi, Mi-Ja;Jo, Hyun-Ju
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.23 no.6
    • /
    • pp.713-722
    • /
    • 2013
  • The purpose of this study was to examine the effects of dietary green tea powder supplementation on bone metabolism in streptozotocin-induced diabetic rats. Thirty-two male Sprague-Dawley rats (body weight $210{\pm}3g$) were divided into two groups, diabetic and non-diabetic groups. Each group was randomly divided into two subgroups which were fed with the control and 1% green tea powder diets. The serum and urine concentrations of calcium and phosphorus were determined. Serum osteocalcin and ALP and urinary DPD crosslinks value were measured in order to monitor bone formation and resorption. Bone mineral density (BMD) and bone mineral content (BMC) were estimated using PIXImus in the spine and femur. Body weight gain and FER were lower in the diabetic group than in the non-diabetic group regardless of diets. The serum concentration of calcium and phosphorus were not changed among all groups. Urinary calcium and phosphorus excretion were higher in the diabetic group than in the non-diabetic group regardless of diets; however, they were not significantly different by green tea powder intake. Serum alkaline phosphatase (ALP) was increased in the diabetic group than in thenon-diabetic group. Further, there were no significant differences in serum osteocalcin and urinary deoxypyridinoline crosslinks value among all groups. The levels of spine and femur bone mineral density of the diabetic group were significantly lower than that of the non-diabetic group. Within the diabetic group, spine BMD was significantly higher in rats fed with the green tea powder diet than in rats fed the control diet. Therefore, this study suggests that green tea powder has a beneficial effect on bone health, although it is not directly applicable to humans.

The Issues and Characteristics of the Preliminary Draft Convention on International Contracts Concluded or Evidenced by Data Message (전자계약에 관한 국제협약 예비초안의 논점과 특징에 관한 고찰)

  • Choi, Seok-Beom;Park, Jong-Suk
    • International Commerce and Information Review
    • /
    • v.5 no.1
    • /
    • pp.85-100
    • /
    • 2003
  • Legal rules applying to the commerce and international commerce in particular contracts, proper law, jurisdiction and so on, have improved with time and experience. Engaging in e-commerce on the World Wide Web may expose the company to the risk of being sued in any foreign country where Internet user can establish a legal claim. The modem law of contracts is highly sophisticated and difficult to understand. With contracts created in cyberspace, the basic rules are no difference that we can find. However, there are situations in e-commerce that are altogether new and to which the existing rules cannot apply. Here uncertainty and business risk is too high for trading partners to deal with certainty. Therefore existing law must change to e-commerce law so that it provides certainty and enforceability over e-commerce. UNCITRAL Working Group on Electronic Commerce prepared the Preliminary Draft Convention on [International] Contracts Concluded or Evidenced by Data Message from the thirty-ninth session in 2002 which applies to international contracts concluded or evidenced by means of data messages. An electronic contract is concluded when the acceptance of an offer becomes effective, and an offer becomes effective when it is received by the offeree, and an acceptance of an offer becomes effective when the indication of assent is received by the offeror according to this Convention. Electronic contract may be concluded by the interaction of an automated computer system and natural person or by the interaction of automated computer systems, and a contract formed by a natural person that accesses an automated computer system of another person has no legal effect in case the neutral person made a material error in a data message.

  • PDF

An Algorithms for Tournament-based Big Data Analysis (토너먼트 기반의 빅데이터 분석 알고리즘)

  • Lee, Hyunjin
    • Journal of Digital Contents Society
    • /
    • v.16 no.4
    • /
    • pp.545-553
    • /
    • 2015
  • While all of the data has a value in itself, most of the data that is collected in the real world is a random and unstructured. In order to extract useful information from the data, it is need to use the data transform and analysis algorithms. Data mining is used for this purpose. Today, there is not only need for a variety of data mining techniques to analyze the data but also need for a computational requirements and rapid analysis time for huge volume of data. The method commonly used to store huge volume of data is to use the hadoop. A method for analyzing data in hadoop is to use the MapReduce framework. In this paper, we developed a tournament-based MapReduce method for high efficiency in developing an algorithm on a single machine to the MapReduce framework. This proposed method can apply many analysis algorithms and we showed the usefulness of proposed tournament based method to apply frequently used data mining algorithms k-means and k-nearest neighbor classification.

Inhibitory Effects of YP 12, A Newly Synthesized Obovatol Derivative on Rat Aortic Vascular Smooth Muscle Cell Proliferation

  • Lim, Yong;Lee, Mi-Yea;Jung, Jae-Kyung;Pyo, Myoung-Yun;Yun, Yeo-Pyo
    • Journal of Food Hygiene and Safety
    • /
    • v.26 no.3
    • /
    • pp.187-191
    • /
    • 2011
  • Platelet derived growth factor (PDGF)-BB is one of the most potent vascular smooth muscle cell(VSMC) proliferative factors, and abnormal VSMC proliferation by PDGF-BB plays an important role in the development and progression of atherosclerosis. The aim of this study was to assess the effect of YP 12, a newly synthesized obovatol derivative, on the proliferation of PDGF-BB-stimulated rat aortic VSMCs. The anti-proliferative effects of YP 12 on rat aortic VSMCs were examined by direct cell counting and by using $[^3H]$ thymidine incorporation assays. It was found that YP 12 potently inhibited the growth of VSMCs. The pre-incubation of YP 12 (1-4 ${\mu}M$) significantly inhibited the proliferation and DNA synthesis of 25 ng/ml PDGF-BB-stimulated rat aortic VSMCs in a concentration-dependent manner. In accordance with these findings, YP 12 revealed blocking of the PDGF-BB-inducible progression through G0/G1 to S phase of the cell cycle in synchronized cells. Whereas, YP 12 did not show any cytotoxicity in rat aortic VSMCs in this experimental condition by WST-1 assay. These results also show that YP 12 may have potential as an anti-proliferative agent for the treatment of restenosis and atherosclerosis.