• 제목/요약/키워드: Cyber-space

Search Result 479, Processing Time 0.026 seconds

A Study on the Changing Image of Glossy Materials after 1960s (1960년대 이후 광택소재 이미지 변화에 대한 연구)

  • 이유경;이희현
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.6 no.1
    • /
    • pp.64-72
    • /
    • 2004
  • The purpose of this paper is to investigate the changing fashion image of the glossy materials including metal, leather, vinyl, latex, plastic etc. from 1960's to the present. Glossy materials used in the second half of the 20th century showed a restricted image combined with a specific social circumstance. They expressed a reflection of young and future-oriented space period of 1960s. Many designers like Paco Rabanne and Andre Courreges were concerned with the fashion of space age and expressed that image with leather and synthetic materials including silver leather, metal chain armor, and plastic appeared as the keynote of fashion. In 1970's, glossy material was the symbol of avant-garde and rebellious attitude by the punk fashion. They maximized glamourous look of 1980s, and cyber look with an expectation for a new millenium of 1990s. On the other side, glossy materials seem to be used as a source of various inspiration of fashion designer in the 21st century. Also, some of the past images, for example space look and glamourous look, are revived in the 21 st century by the form of modified design.

  • PDF

The Study of Simulation for Reproduce Accidents of Narrow Dwelling Space (협소 거주공간 사고 재현을 위한 시뮬레이션 연구)

  • Lee, Changwoo;Choi, Beakyoul;Kim, Jinsung;Cho, Yongsun;Yoo, Juyoul
    • Journal of the Society of Disaster Information
    • /
    • v.12 no.3
    • /
    • pp.210-218
    • /
    • 2016
  • In this study, the fire analysis program FDS and Pathfinder was used to analysis a simulated accidental fire of a narrow dwelling space as a test bed. The results showed that the evacuation time of the H form internal building structure was the fastest at 285 seconds. In addition, when the automatic sprinkler system functioned with the entrances closed, the temperature distribution was lower and the visible smoke density was reduced.

Military Vulnerability Management Plan based on Military IT Asset Management System for Cyber Threat Response (사이버 위협 대응을 위한 군(軍) 정보화자산관리시스템과 연계한 군(軍) 취약점 관리 방안)

  • Kim, Jong Hwa;Lim, Jae Sung
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.111-116
    • /
    • 2018
  • The Cyber space of the ROK Army is constantly threatened by enemy. In order to reponse to such cyber treats, vulnerabilities of information assets of the ROK Army should be identified and eliminated early. However, the ROK Army currently lacks systematic management of vulnerabilities. Therefore, this paper investigates trends of each country's vulnerability management and the actual situation of the management of the vulnerabilities in the ROK Army, and suggests ways of linking vulnerability database and the ROK Army information asset management system for effective vulnerability management of the ROK Army information assets.

  • PDF

How Does the Internet Audience Participate in Cyber Spare and Constitute Cyber Culture? (인터넷 수용자의 참여방식과 문화적 생산 -<여인천하> 게시판 분석-)

  • Joo, Chang-Yun
    • Korean journal of communication and information
    • /
    • v.19
    • /
    • pp.265-294
    • /
    • 2002
  • The purpose of this study is to explore the way in which the internet audience constitutes cyber culture by analysing a bulletin board system(BBS) on a historical drama, 'The World of Women'(SBS). Research findings show that the internee audience participates in a cyber space by five manners; personal participation(18.9%), critique of broadcaster's policy(11.3%), participation in a television drama community(42.1%), co-authorship(6.4%), evaluation and interpretation(21.3%). Through these kinds of participant activities, the internee audience tends to constitute a new cyber culture. Firstly, the audience seems to read 'The World of Women' by a specific way. It is the interest of a Um court lady that is characteristic on BBS of 'The World of Women'. Secondly, the internet audience constructs a new community of meaning by means of using emoticon(emotion and icon), deconstructing grammar, and remaking new signs. Thirdly, the internet audience argues their power over drama production, in other words, their ownership over the drama. Fouthly, the audience actively protests and criticise the policy of the broadcaster, especially charged service. Finally, the internet audience is likely to enjoy writing itself as a fun.

  • PDF

Design and Implementation of A Cyber Counseling System to Support Information for Student Guidance (학생지도 정보를 제공하는 사이버상담 시스템의 설계 및 구현)

  • 오세정;최숙영
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.12
    • /
    • pp.1573-1580
    • /
    • 2001
  • Due to development of technology of information technology, PC communication and Internet have become a culture space of teenagers. Because Internet and PC communication are media in which teenagers have interests, they could be effectively used to counsel teenagers in that time they want. Moreover, cyber counseling will be suitable to new trend of current age with extension of counseling area. Accordingly, many researches on cyber counseling have proceeded in the area of teenagers counseling. While most researches for cyber counseling until present are about counseling methods ad the effects that teenagers utilize cyber counseling, there were no efforts that store counseling contents, analyze them using features and technologies of web and use them effectively to guide students. Therefore, we implemented a cyber counseling system that provides counseling information so that teacher may grasp students various interests and problems and thus helps to guide students.

  • PDF

Standardization Model and Implementation of Event Type in Real Time Cyber Threat (실시간 위협에서 Event 유형의 정형화 설계 및 구현)

  • Lee, Dong-Hwi;Lee, Dong-Chun;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.67-73
    • /
    • 2006
  • The method which research a standardization from real time cyber threat is finding the suspicious indication above the attack against cyber space include internet worm, virus and hacking using analysis the event of each security system through correlation with the critical point, and draft a general standardization plan through statistical analysis of this evaluation result. It means that becomes the basis which constructs the effective cyber attack response system. Especially at the time of security accident occurrence, It overcomes the problem of existing security system through a definition of the event of security system and traffic volume and a concretize of database input method, and propose the standardization plan which is the cornerstone real time response and early warning system. a general standardization plan of this paper summarizes that put out of threat index, threat rating through adding this index and the package of early warning process, output a basis of cyber threat index calculation.

  • PDF

A Study on Business model of through Second life (세컨드 라이프(Second Life)를 통한 문화콘텐츠 비즈니스 모델연구)

  • Choi, Eunyoung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.431-435
    • /
    • 2008
  • Thanks to the development of internet, on-line market expands exponentially and corresponding solid business models are drawn attentions. Most of on-line trading items are limited with selling game related items however, Linden Lab made its turning point by introducing cyber reality game to shape the cyber life with creating his own Avatar in 2003. After 2003, Second life has grown sharply that over 12 million users around the world. While former games are progressed within fixed scenario, the concept of avatars who live his or her own lives at the cyber space that successfully differentiate from former online game. Further, cyber money, Linden Dollar can be used to buy real estate, cloth, shoes just like at real economy system. Not only for using corporate marketing, various areas of activities; promotion of public sector, politics, education are also functioned at the cyber life. In Korea, Korean version of Second life was introduced at the end of 2007 that draws attentions from the users. In this study, I examine various business models of cyber through Second life and suggest feasible culture-contents applying models.

  • PDF

Cyber Attacks and Appropriateness of Self-Defense (사이버 공격과 정당방위의 당위성)

  • Shin, Kyeong-Su
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.21-28
    • /
    • 2019
  • The emergence of a hyper-connected-super-intelligence society, called the era of the Fourth Industrial Revolution, brought about a new change in the security environment. With ICT (Information Communication Technology) convergence and high-tech technologies introduced across the board, the person-centered driving force that moved the real space is replaced by the code-oriented cyberspace, and its dependency is constantly increasing. Paradoxically, however, these technological changes serve as another security vulnerability that threatens our society, and have brought about the justification for building a cyber defense system while simultaneously facing the opportunities and challenges brought by technology. In this study, the theory of self-defense was put forward on the basis of the theoretical basis for actively responding to the increasingly intelligent and mass-evolving cyberattacks, and firstly, the need to enact a cybersecurity law, secondly, and thirdly, the need to develop a response cooperation system with the U.S. and other cyber powers.

A Cognitive Study on the Usability of Cross-referencing link ad Multiple hierarchies (교차적 연결과 다계층구조의 유용성에 관한 인지적 연구 : 사이버쇼핑몰의 커스터머 인터페이스를 중심으로)

  • 이정원;김진우
    • Korean Journal of Cognitive Science
    • /
    • v.10 no.1
    • /
    • pp.25-43
    • /
    • 1999
  • The focus of this study is on the elements of structure design that facilitate u user interaction with applications within cyberspace Structure design entails decisions regarding the optimal classification and hierarchical organization of information into s successively higher units. i.e .. the grouping of highly related information in the form of nodes of a site and the subsequent connection of nodes that are inter-related. The decisions are based on the designer's subjective classification framework. which is not always compatible with that of the user. We propose that the ensuing cognitive dissonance can be reduced via the employment of multiple hierarchies and cross-referencing links. Multiple hierarchies represent a single information space in terms of a number of single hierarchies. each of which represent a different perspective Cross-referencing refers to the inter-connection between the constituent hierarchies by providing a link to the alternate hierarchy for information that is most likely to be categorized in diverse manners by users with differing perspectives. In this study we conducted two empirical studies to gauge the effectiveness of multiple hierarchies and Cross-referencing links in the domain of cyber shopping malls. In the first phase. an experiment was conducted to determine how subjects classified given products with respect to two different perspectives for categorization. Experimental cyber malls were developed based on the results from the first phase to test the effectiveness of multiple hierarchies and cross-referencing links. Results show that the ease of navigation was higher for cyber malls that had implemented cross-referencing links are of greater value when used in conjunction with single hierarchical designs rather than multiple hierarchies. Users satisfaction with and ease of navigation was higher for cyber malls that had not implemented multiple hierarchies. This paper concludes with discussion of these results and their implications for designers of cyber malls.

  • PDF

Detection of Signs of Hostile Cyber Activity against External Networks based on Autoencoder (오토인코더 기반의 외부망 적대적 사이버 활동 징후 감지)

  • Park, Hansol;Kim, Kookjin;Jeong, Jaeyeong;Jang, jisu;Youn, Jaepil;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.39-48
    • /
    • 2022
  • Cyberattacks around the world continue to increase, and their damage extends beyond government facilities and affects civilians. These issues emphasized the importance of developing a system that can identify and detect cyber anomalies early. As above, in order to effectively identify cyber anomalies, several studies have been conducted to learn BGP (Border Gateway Protocol) data through a machine learning model and identify them as anomalies. However, BGP data is unbalanced data in which abnormal data is less than normal data. This causes the model to have a learning biased result, reducing the reliability of the result. In addition, there is a limit in that security personnel cannot recognize the cyber situation as a typical result of machine learning in an actual cyber situation. Therefore, in this paper, we investigate BGP (Border Gateway Protocol) that keeps network records around the world and solve the problem of unbalanced data by using SMOTE. After that, assuming a cyber range situation, an autoencoder classifies cyber anomalies and visualizes the classified data. By learning the pattern of normal data, the performance of classifying abnormal data with 92.4% accuracy was derived, and the auxiliary index also showed 90% performance, ensuring reliability of the results. In addition, it is expected to be able to effectively defend against cyber attacks because it is possible to effectively recognize the situation by visualizing the congested cyber space.