• Title/Summary/Keyword: Cyber-Space

Search Result 476, Processing Time 0.025 seconds

A Study on the Cyber-geospace Construction in the Evernet Age (에버넷 시대의 사이버국토 구축방안)

  • 김영표
    • Spatial Information Research
    • /
    • v.11 no.4
    • /
    • pp.371-389
    • /
    • 2003
  • This study aims at defining the concept of a cyber-geospace and proposing how to establish a cyber-geospace fir the entire country in detail. The study defined the cyber-geospace as 'the dynamic second territory of Korea not only to manage the land systematicality and deal with administrative services for the people in aspect of public sector, but also to contain economic activities of corporations and the citizen's everyday lives in aspect of private sector, in a 3D virtual reality made by digitizing various facilities and buildings as well as the entire toterritory including ground, underground and even sea'. In order to establish such a cyber-geospace, the project should be pursued on the national level fir around ten-year period.

  • PDF

A Study on Effective Response of Police Officer against Cybercrime (경찰의 사이버범죄에 대한 효율적 대응방안에 관한 연구)

  • Park, Chang-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.189-196
    • /
    • 2008
  • In this modern society, a main tendency of crime is to increase in the incidence frequency of cyber crime. Varied criminal techniques from simple crimes to highly specialized crimes appear through cyber space. With the expansion of Internet spread, ordinary people increasingly have an opportunity to have access to information media and their possibilities to be involuntary associated with crimes get higher. In this sense, its seriousness is great. This study examined the present state of cyber crimes that appear through their several types and characteristics and the problems of police response to cyber crimes, and suggest effective response of police officer.

  • PDF

Rhyme of Truce, Training Program for moral psychology in Cyberspace

  • Cho, JeongHee;Lim, Chan
    • International journal of advanced smart convergence
    • /
    • v.8 no.1
    • /
    • pp.176-183
    • /
    • 2019
  • Rhyme of Truce is an educational program that helps you develop the ability to cope with cyber violence rightly. we aim to produce educational contents that will last a long time in the memory of specially children. By combining the room escape game and Leap motion / VR, the program reflects the user's motion and action in real time. The Keyboard Worrier comes into contact with the user and causes violence, and the user who is attacked by the monster see several negative messages written in red and hears abuses sound. Users enter the virtual space decorated as the cyber world. They can experience cyber-violence indirectly but vividly, and if language violence, which has been overlooked and recognized only as "letters", is executed offline, it will directly wonder if cyber-violence should also be regarded as a means of violence. Users have the opportunity to cope with violence autonomously. When a user is attacked by an in-game monster, there are two ways to choose from. First, fighting against with a keyboard (which is a symbol of language violence) just like a monster. Second, report the abuser to cyber bureau police. Both methods make them to escape the room, but when they get out of the room and return to the home and read the message through the monitor, users can recognize which action was right for.

Intelligent Search System Providing The Various Conditional Product Search (다조건 상품 검색을 지원하는 지능형 검색 시스템)

  • 서양진;한상용
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.3
    • /
    • pp.179-196
    • /
    • 1999
  • A cyber shopping mall is a place where consumers acquire the product information and make purchase decision in the cyber space. Even though there are many advantages over traditional malls, there are still several limitations to do shopping in an existing cyber mall. One of them is the absence of efficient search tool to handle various products specifications. Existing search systems usually support the "keyword search only" with limited product information. Consumers spend lots of their time and efforts in searching products and comparing them. Recently, some web sites provide the shopping mall comparison service that supports the additional search conditions such as price and maker. These services improve the situation but it is not still acceptable. In this paper, we propose an intelligent product search system based on a mediator which supports various conditional search for each product. Our system provides consumers with search results that satisfy purchase specifications. Our system is implemented in Visual basic and pert and experimental results show satisfactory performance.

  • PDF

A Study on the Cyber Science Museum Construction (가상과학 박물관 구축에 관한 연구)

  • 강순덕
    • The Journal of Information Technology
    • /
    • v.4 no.4
    • /
    • pp.101-112
    • /
    • 2001
  • This paper aims at making cyber science museum construction. JAVA 3D and VR 3D which concentrate the scientific capacity and the technical capacity with the new technology of software, contribution of multimedia and educational data realized the Cyber Science Museum. So, It realized high level information service. It offered a user the educational data which has three dimension service of cyber space and useful science information. After all, It contributed to IT industry.

  • PDF

Current State of and Cutoff Schemes for Academic Misconducts in the Cyber Classes

  • Woo, Jong-Jung
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.1
    • /
    • pp.5-10
    • /
    • 2012
  • The cyber class has many advantages because it removes the limitations of sharing the same time and space of a class in a classroom. However, most instructors still hesitate to use it because it is more vulnerable to academic misconduct than a faceto- face class. To overcome this problem, we identified suspected cheaters out of a group of test-takers through several objective data, and verified whether or not the suspects were actually cheaters. By investigating the status of academic cheating, we also implement our assessment system with Skinner’s reinforcement theory in order to eliminate or reduce cyber misconducts.

A Study on the Formations and Compositions of the Cyber Museum -Focusing on the case of oversea natural history museum- (사이버 뮤지엄의 형식과 구성에 관한 고찰 -자연사 박물관 분야에 대한 해외사례를 중심으로-)

  • 임경부;임채진
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 1999.04a
    • /
    • pp.7-10
    • /
    • 1999
  • The organization of modern society is suddenly changing from the modern society to the ultra modern informationalized society. Various social members must satisfy cultural and artistic desires to serve museum concept and function to move the informationalized society. A lot of natural history museum in the world build cyber space exhibition lines. Audiences do not directly visit but they view but they view the exhibit, get an education, participate in the cultrue programs and earn the museum's informations. Especially, in the case of national and public museums in Korea, they do not concerned the museum architecture before processing the character and collections of the museum. Cyber museums determine museum character, policy, information, collections converge of opinion voluntary collection and grasp of location, because cyber museum can be finished be4fore the work of the future museum.

  • PDF

Intelligent Search System for Comparative Searches (비교 검색을 위한 지능형 검색 시스템)

  • Yangjin Seo;Sangyong Han
    • Proceedings of the CALSEC Conference
    • /
    • 2001.08a
    • /
    • pp.625-629
    • /
    • 2001
  • A cyber shopping mall is a place where consumers acquire product information, and make purchase decisions in the cyber space. Even though it offers many advantages over traditional malls, there are still several limitations to do shopping in an existing cyber mall. One of these limitations is the absence of an efficient shopping aid to compare multiple items from multiple malls. Existing search systems usually support a keyword search with limited conditions. Consumers spend lots of their time to compare multiple alternatives from search results. In this paper, we propose an intelligent product search system. There are two main features in our system. The first one is a full support of comparison shopping with multiple perspectives based on commercial search engines. The second one is an enhancement to the shopping aid based on a new concept of Shopping AssistanT. Our system is implemented in Visual Basic and PERL, and experimental results show a satisfactory performance.

  • PDF

A Survey for Vulnerability Attack and Defense Method of Satellite-Link Based Communication System

  • Isaac Sim;Jinwoo Jeong;Sangbom Yun;Yunsik Lim;Junghyun Seo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.128-133
    • /
    • 2023
  • Satellite based communication is networks in which users in a wide area can access without wired-based ground infrastructure. In particular, the need is emerging due to the recent Ukraine-Russia war. Satellite network systems acquire data that is difficult to observe on Earth as well as communication networks and are also used for research and development, which allows additional data to be produced. However, due to the nature of communication networks existing in outer space, certain vulnerabilities are revealed, and attacks based on them can be exposed. In this paper, we analyze vulnerabilities that may arise due to the nature of satellite communication networks and describes current research, countermeasures, and future research directions.

A strategic Approach for Establishing Korea's Cyber Terrorism Policy : Focusing on the UK's cyber terrorism policy (국내 사이버테러 정책수립을 위한 전략적 접근방안 : 영국의 사이버테러 정책을 중심으로)

  • Kim, Byung-Hwa
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.173-195
    • /
    • 2017
  • Recently, in South Korea, security management has been strengthened, but there have been an increasing number of cases where the main infrastructure of the country is hacked in the cyber space. South Korea is equipped with sophisticated information and communication technologies, such as Internet, but is threatened by cyber terrorism of North Korea and terrorist organizations. Nevertheless, there is a limit to how to develop a policy and strategic plan for the country, which is related to domestic terrorism and lacks legal and regulatory facilities, and therefore, in this study, proposed suggestions for building adaptive and efficient policy formulation. Based on the theoretical analysis framework of the Strategic Plan for achieving the objectives of the research, we compared the UK 's security strategy with the national security policy of the domestic government. As a result, several problems were derived: First, the domestic security strategy did not take into account the external environment. Secondly, lack of coordination with domestic cyber security goals setting and strategy is causing ambiguity and confusion. Third, the detailed plan of implementation of national security in each province is designed to ensure that there is a possibility that a mixed side effect between ministries and agencies will arise. Fourth, it was found that there was a limit to prepare the evaluation standards for the evaluation and return of domestic security policies in the country. Therefore, in order to establish a policy for the response of domestic cyber terrorism, we set up a vision from long-term perspectives and concrete targets based on the strategic approach of the security policy, It is necessary to present an assignment and formulate an efficient execution plan. It is necessary to maintain and improve the domestic safeguards in order to be able to complement the problems through evaluation and feedback.

  • PDF