• Title/Summary/Keyword: Cyber-University

Search Result 2,856, Processing Time 0.038 seconds

A Study on the Current State and Improvements of Digital Libraries in Cyber Universities (사이버대학 디지털도서관 현황분석과 개선방안에 관한 연구)

  • Lee, Ji-Won;Kim, Soojung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.47 no.4
    • /
    • pp.79-102
    • /
    • 2013
  • This study examined the current state of digital libraries in Korean cyber universities and suggested recommendations for improvements. The study conducted a survey and face-to-face interviews with people in charge of managing cyber university digital libraries, and analyzed library Web sites as well as library holdings and budget information available from the university information disclosure. The examples of cyber university digital libraries in other countries were also analyzed. Based on the findings, the study developed guidelines and policies for improving cyber university digital libraries and suggested a hosting-based digital library system. The findings of this study is expected to contribute to enhancing the quality of education in cyber universities.

An Analysis on e-Learning Readiness and Learning Activities of Adult Learners in a Cyber University (사이버대학 성인 학습자의 이러닝 준비도와 학습활동 분석)

  • Park, Jong-Sun;Lee, Young-Min
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.4
    • /
    • pp.51-59
    • /
    • 2010
  • Many of learners in cyber universities have experienced the difficulties of learning and participation because they have never participated courses of cyber universities before. One of main reasons why they have experienced the difficulties was that they might have not received systematic guidances of university system as well as learning supports, depending on their readiness of e-learning. Otherwise, they may have lack of supports frequently and finally, fail to graduate. However, few studies were conducted to investigate the e-learning readiness of freshmen and enrollees in cyber universities. The purpose of the study was to analyze the e-learning readiness and learning activities of freshmen and enrollees of A cyber university and to support them more systematically and get them to succeed in studying. In the results, there were no differences between the freshmen and enrollees in basic competencies of cyber learning as well as interaction, task performance, and learning methods.

  • PDF

A Study on the Improvement of Effectiveness in National Cyber Security Monitoring and Control Services (국가 전산망 보안관제업무의 효율적 수행방안에 관한 연구)

  • Kim, Young-Jin;Lee, Su-Yeon;Kwon, Hun-Yeong;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.103-111
    • /
    • 2009
  • Recently, cyber attacks against public communications networks are getting more complicated and varied. Moreover, in some cases, one country could make systematic attacks at a national level against another country to steal its confidential information and intellectual property. Therefore, the issue of cyber attacks is now regarded as a new major threat to national security. The conventional way of operating individual information security systems such as IDS and IPS may not be sufficient to cope with those attacks committed by highly-motivated attackers with significant resources. As a result, the monitoring and control of cyber security, which enables attack detection, analysis and response on a real-time basis has become of paramount importance. This paper discusses how to improve efficiency and effectiveness of national cyber security monitoring and control services. It first reviews major threats to the public communications network and how the responses to these threats are made and then it proposes a new approach to improve the national cyber security monitoring and control services.

The Differences of University Student of Cyber Crime Recognition according to Internet Addiction Tendency (대학생의 인터넷 중독 경향에 따른 사이버 범죄인식의 차이)

  • Kim, Joung-Gyu
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.298-304
    • /
    • 2007
  • The purpose of this study was to exam the casual relationship between Internet addiction and cyber crime's recognition of university student. This study summarize three results. First, male student Internet addiction was higher than female student. Second, it was analyzed that internet addiction group recognizes cyber crime averagely higher than general use group. It is understood that according as internet practical use time increases, they recognize much danger that exposed cyber crimie. Third, cyber criminal recognition by internet addiction did multiplex regression analysis. As a result, Internet addiction was analyzed that cyber crime recognition increases according as increasing of addiction level that connected with usually life difficulty and deviation behavior.

  • PDF

Evaluation of Participation & Management on the Cyber Hospice Specialist Program (사이버 호스피스 전문 간호 교육 과정에서의 학습참여와 운영평가)

  • Kim, Boon-Han;Choi, Ji-Eun
    • Korean Journal of Adult Nursing
    • /
    • v.15 no.1
    • /
    • pp.105-115
    • /
    • 2003
  • Purpose: The research purposes analyzed the study participation and lecture evaluation of applicants in the cyber hospice specialist education course to find problems of nurse education application on the web. Method: Study participants were 125 nurses for participation and 68nurses for lecture evaluation. The data was analysed by descriptive statistics. Result: The results obtained from this study were as follows 1) The residence distribution of study participants was spread out across the nation. Equal distribution of education was accomplished without a difference among provinces. 2) The average study duration in the study participation was about one hour and a quarter minutes a week, and number of access to lecture notes was 65.8 times. But in a discussion room and a cooperative room, the system using rate was very low, so we considered the idea to come up with a more effective application way. 3) The participant's lecture evaluation of cyber education were generally satisfied about the quality of lecture, time, contents etc. Conclusion: This study shows the possible implication for nursing fields using a web-based learning program for reeducation in a variety of fields, so nursing cyber application can be considered to come up with this more effective method.

  • PDF

The Reality and Response of Cyber Threats to Critical Infrastructure: A Case Study of the Cyber-terror Attack on the Korea Hydro & Nuclear Power Co., Ltd.

  • Lee, Kyung-bok;Lim, Jong-in
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.857-880
    • /
    • 2016
  • Due to an increasing number of cyberattacks globally, cybersecurity has become a crucial part of national security in many countries. In particular, the Digital Pearl Harbor has become a real and aggressive security threat, and is considered to be a global issue that can introduce instability to the dynamics of international security. Against this context, the cyberattacks that targeted nuclear power plants (NPPs) in the Republic of Korea triggered concerns regarding the potential effects of cyber terror on critical infrastructure protection (CIP), making it a new security threat to society. Thus, in an attempt to establish measures that strengthen CIP from a cybersecurity perspective, we perform a case study on the cyber-terror attacks that targeted the Korea Hydro & Nuclear Power Co., Ltd. In order to fully appreciate the actual effects of cyber threats on critical infrastructure (CI), and to determine the challenges faced when responding to these threats, we examine factual relationships between the cyberattacks and their responses, and we perform analyses of the characteristics of the cyberattack under consideration. Moreover, we examine the significance of the event considering international norms, while applying the Tallinn Manual. Based on our analyses, we discuss implications for the cybersecurity of CI in South Korea, after which we propose a framework for strengthening cybersecurity in order to protect CI. Then, we discuss the direction of national policies.

Rhyme of Truce, Training Program for moral psychology in Cyberspace

  • Cho, JeongHee;Lim, Chan
    • International journal of advanced smart convergence
    • /
    • v.8 no.1
    • /
    • pp.176-183
    • /
    • 2019
  • Rhyme of Truce is an educational program that helps you develop the ability to cope with cyber violence rightly. we aim to produce educational contents that will last a long time in the memory of specially children. By combining the room escape game and Leap motion / VR, the program reflects the user's motion and action in real time. The Keyboard Worrier comes into contact with the user and causes violence, and the user who is attacked by the monster see several negative messages written in red and hears abuses sound. Users enter the virtual space decorated as the cyber world. They can experience cyber-violence indirectly but vividly, and if language violence, which has been overlooked and recognized only as "letters", is executed offline, it will directly wonder if cyber-violence should also be regarded as a means of violence. Users have the opportunity to cope with violence autonomously. When a user is attacked by an in-game monster, there are two ways to choose from. First, fighting against with a keyboard (which is a symbol of language violence) just like a monster. Second, report the abuser to cyber bureau police. Both methods make them to escape the room, but when they get out of the room and return to the home and read the message through the monitor, users can recognize which action was right for.

Cybersecurity Development Status and AI-Based Ship Network Security Device Configuration for MASS

  • Yunja Yoo;Kyoung-Kuk Yoon;David Kwak;Jong-Woo Ahn;Sangwon Park
    • Journal of Navigation and Port Research
    • /
    • v.47 no.2
    • /
    • pp.57-65
    • /
    • 2023
  • In 2017, the International Maritime Organization (IMO) adopted MSC.428 (98), which recommends establishing a cyber-risk management system in Ship Safety Management Systems (SMSs) from January 2021. The 27th International Association of Marine Aids to Navigation and Lighthouse Authorities (IALA) also discussed prioritizing cyber-security (cyber-risk management) in developing systems to support Maritime Autonomous Surface Ship (MASS) operations (IALA guideline on developments in maritime autonomous surface ships). In response to these international discussions, Korea initiated the Korea Autonomous Surface Ship technology development project (KASS project) in 2020. Korea has been carrying out detailed tasks for cybersecurity technology development since 2021. This paper outlines the basic concept of ship network security equipment for supporting MASS ship operation in detailed task of cybersecurity technology development and defines ship network security equipment interface for MASS ship applications.

Machine Learning Based Hybrid Approach to Detect Intrusion in Cyber Communication

  • Neha Pathak;Bobby Sharma
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.190-194
    • /
    • 2023
  • By looking the importance of communication, data delivery and access in various sectors including governmental, business and individual for any kind of data, it becomes mandatory to identify faults and flaws during cyber communication. To protect personal, governmental and business data from being misused from numerous advanced attacks, there is the need of cyber security. The information security provides massive protection to both the host machine as well as network. The learning methods are used for analyzing as well as preventing various attacks. Machine learning is one of the branch of Artificial Intelligence that plays a potential learning techniques to detect the cyber-attacks. In the proposed methodology, the Decision Tree (DT) which is also a kind of supervised learning model, is combined with the different cross-validation method to determine the accuracy and the execution time to identify the cyber-attacks from a very recent dataset of different network attack activities of network traffic in the UNSW-NB15 dataset. It is a hybrid method in which different types of attributes including Gini Index and Entropy of DT model has been implemented separately to identify the most accurate procedure to detect intrusion with respect to the execution time. The different DT methodologies including DT using Gini Index, DT using train-split method and DT using information entropy along with their respective subdivision such as using K-Fold validation, using Stratified K-Fold validation are implemented.

Web Attack Classification via WAF Log Analysis: AutoML, CNN, RNN, ALBERT (웹 방화벽 로그 분석을 통한 공격 분류: AutoML, CNN, RNN, ALBERT)

  • Youngbok Jo;Jaewoo Park;Mee Lan Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.587-596
    • /
    • 2024
  • Cyber Attack and Cyber Threat are getting confused and evolved. Therefore, using AI(Artificial Intelligence), which is the most important technology in Fourth Industry Revolution, to build a Cyber Threat Detection System is getting important. Especially, Government's SOC(Security Operation Center) is highly interested in using AI to build SOAR(Security Orchestration, Automation and Response) Solution to predict and build CTI(Cyber Threat Intelligence). In this thesis, We introduce the Cyber Threat Detection System by analyzing Network Traffic and Web Application Firewall(WAF) Log data. Additionally, we apply the well-known TF-IDF(Term Frequency-Inverse Document Frequency) method and AutoML technology to classify Web traffic attack type.