• Title/Summary/Keyword: UBIQUITOUS

Search Result 5,267, Processing Time 0.04 seconds

Measuring the Third-Person Effects of Public Opinion Polls: Focusing On Online Polls (여론조사보도에 대한 제3자효과 검증: 온라인 여론조사를 주목하며)

  • Kim, Sung-Tae;Willnat, Las;Weaver, David
    • Korean journal of communication and information
    • /
    • v.32
    • /
    • pp.49-73
    • /
    • 2006
  • During the past decades, public opinion polls have become an ubiquitous tool for probing the complexity of people's beliefs and attitudes on a wide variety of issues. Especially since the late 1970s, the use of polls by news organizations has increased dramatically. Along with the proliferation of traditional polls, in the past few years pollsters and news organizations have come to recognize the advantages of online polls. Increasingly there has been more effort to take the pulse of the public through the Internet. With the Internet's rapid growth during the past years, advocates of online polling often emphasize the relative advantages over traditional polls. Researchers from Harris Black International Ltd., for example, argue that "Internet polling is less expensive and faster and offers higher response rates than telephone surveys." Moreover, since many of the newer online polls draw respondents from large databases of registered Internet users, results of online polls have become more balanced. A series of Harris Black online polls conducted during the 1998 gubernatorial and senatorial elections, for example, has accurately projected the winners in 21 of the 22 races it tracked. Many researchers, however, severely criticize online polls for not being representative of the larger population. Despite the often enormous number of participants, Internet users who participate in online polls tend to be younger, better educated and more affluent than the general population. As Traugott pointed out, the people polled in Internet surveys are a "self selected" group, and thus "have volunteered to be part of the test sample, which could mean they are more comfortable with technology, more informed about news and events ... than Americans who aren't online." The fact that users of online polls are self selected and demographically very different from Americans who have no access to the Internet is likely to influence the estimates of what the majority of people think about social or political issues. One of the goals of this study is therefore to analyze whether people perceive traditional and online public opinion polls differently. While most people might not differentiate sufficiently between traditional random sample polls and non representative online polls, some audiences might perceive online polls as more useful and representative. Since most online polls allow some form of direct participation, mostly in the form of an instant vote by mouse click, and often present their findings based on huge numbers of respondents, consumers of these polls might perceive them as more accurate, representative or reliable than traditional random sample polls. If that is true, perceptions of public opinion in society could be significantly distorted for those who rely on or participate in online polls. In addition to investigating how people perceive random sample and online polls, this study focuses on the perceived impact of public opinion polls. Similar to these past studies, which focused on how public opinion polls can influence the perception of mass opinion, this study will analyze how people perceive the effects of polls on themselves and other people. This interest springs from prior studies of the "third person effect," which have found that people often tend to perceive that persuasive communications exert a stronger influence on others than on themselves. While most studies concerned with the political effects of public opinion polls show that exit polls and early reporting of election returns have only weak or no effects on the outcome of election campaigns, some empirical findings suggest that exposure to polls can move people's opinions both toward and away from perceived majority opinion. Thus, if people indeed believe that polls influence others more than themselves, perceptions of majority opinion could be significantly altered because people might anticipate that others will react more strongly to poll results.

  • PDF

Thioredoxin Peroxidase Manifestation in Radiation-Induced White Rat Lung Tissues (방사선 조사후 손상된 백서 폐조직에서의 Thioredoxin Peroxidase의 발현)

  • Chong, Seong-Cheoll;Park, Joon-Seong;Park, Jee-Won;Lee, Sun-Min;Park, Kwang-Joo;Hwang, Sung-Chul;Lee, Yi-Hyeong;Hahn, Myung-Ho;Oh, Young-Taek;Kim, Hyung-Joong
    • Tuberculosis and Respiratory Diseases
    • /
    • v.47 no.5
    • /
    • pp.650-659
    • /
    • 1999
  • Background/Aims: It is well recognized that all aerobic cells have the protective mechanisms in order to minimize the tissue damage induced by various reactive oxygen species(ROS). Thioredoxin peroxidase(TPX) which has been recently identified and characterized functions to convert peroxide to water. The protein is also found in various subtypes(TPX-A & B, MER5, HS22 and HORF-06) and is known to be ubiquitous in most human cells. Especially, ischemic brain injuries, partial hepatectomy and radiation induced DNA damages. In treating lung cancer, radiation therapy has a major place in the local control and the relief of symptoms, but radiation induced free radical injury and resulting pulmonary fibrosis has been the major drawback of the therapy. However, little is known about the protective mechanisms and biologic modulations against radiation-induced tissue damages. Methods: Eighteen mice were divided into six groups, 3 in each group, and fifteen had received 900cGy of radiation. The mice were sacrificed according to the pre determined time schedule; immediate, 1, 2, 3 and 6 weeks after irradiation. Extracts were made from the lungs of each mice, Western blot analysis of various subtypes of TPX were done after SDS-P AGE. Examination of H & E stained slides from the same irradiated specimens and the control specimens were also performed. Results: No difference in the intensity of the immunoreactive bands in the irradiated lung samples of the mice compared to the unirradiated control was observed regardless of the time intervals, although H & E examination of the sample specimens demonstrated progressive fibrotic changes of the irradiated lung samples. Conclusion: In conclusion, according to our data, it is suggested that various thioredoxin peroxidase subtypes and catalase which are known to be increased in many repair processes may not be involved in the repair of the radiation injury to the lung and subsequent fibrosis.

  • PDF

Context Prediction Using Right and Wrong Patterns to Improve Sequential Matching Performance for More Accurate Dynamic Context-Aware Recommendation (보다 정확한 동적 상황인식 추천을 위해 정확 및 오류 패턴을 활용하여 순차적 매칭 성능이 개선된 상황 예측 방법)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.19 no.3
    • /
    • pp.51-67
    • /
    • 2009
  • Developing an agile recommender system for nomadic users has been regarded as a promising application in mobile and ubiquitous settings. To increase the quality of personalized recommendation in terms of accuracy and elapsed time, estimating future context of the user in a correct way is highly crucial. Traditionally, time series analysis and Makovian process have been adopted for such forecasting. However, these methods are not adequate in predicting context data, only because most of context data are represented as nominal scale. To resolve these limitations, the alignment-prediction algorithm has been suggested for context prediction, especially for future context from the low-level context. Recently, an ontological approach has been proposed for guided context prediction without context history. However, due to variety of context information, acquiring sufficient context prediction knowledge a priori is not easy in most of service domains. Hence, the purpose of this paper is to propose a novel context prediction methodology, which does not require a priori knowledge, and to increase accuracy and decrease elapsed time for service response. To do so, we have newly developed pattern-based context prediction approach. First of ail, a set of individual rules is derived from each context attribute using context history. Then a pattern consisted of results from reasoning individual rules, is developed for pattern learning. If at least one context property matches, say R, then regard the pattern as right. If the pattern is new, add right pattern, set the value of mismatched properties = 0, freq = 1 and w(R, 1). Otherwise, increase the frequency of the matched right pattern by 1 and then set w(R,freq). After finishing training, if the frequency is greater than a threshold value, then save the right pattern in knowledge base. On the other hand, if at least one context property matches, say W, then regard the pattern as wrong. If the pattern is new, modify the result into wrong answer, add right pattern, and set frequency to 1 and w(W, 1). Or, increase the matched wrong pattern's frequency by 1 and then set w(W, freq). After finishing training, if the frequency value is greater than a threshold level, then save the wrong pattern on the knowledge basis. Then, context prediction is performed with combinatorial rules as follows: first, identify current context. Second, find matched patterns from right patterns. If there is no pattern matched, then find a matching pattern from wrong patterns. If a matching pattern is not found, then choose one context property whose predictability is higher than that of any other properties. To show the feasibility of the methodology proposed in this paper, we collected actual context history from the travelers who had visited the largest amusement park in Korea. As a result, 400 context records were collected in 2009. Then we randomly selected 70% of the records as training data. The rest were selected as testing data. To examine the performance of the methodology, prediction accuracy and elapsed time were chosen as measures. We compared the performance with case-based reasoning and voting methods. Through a simulation test, we conclude that our methodology is clearly better than CBR and voting methods in terms of accuracy and elapsed time. This shows that the methodology is relatively valid and scalable. As a second round of the experiment, we compared a full model to a partial model. A full model indicates that right and wrong patterns are used for reasoning the future context. On the other hand, a partial model means that the reasoning is performed only with right patterns, which is generally adopted in the legacy alignment-prediction method. It turned out that a full model is better than a partial model in terms of the accuracy while partial model is better when considering elapsed time. As a last experiment, we took into our consideration potential privacy problems that might arise among the users. To mediate such concern, we excluded such context properties as date of tour and user profiles such as gender and age. The outcome shows that preserving privacy is endurable. Contributions of this paper are as follows: First, academically, we have improved sequential matching methods to predict accuracy and service time by considering individual rules of each context property and learning from wrong patterns. Second, the proposed method is found to be quite effective for privacy preserving applications, which are frequently required by B2C context-aware services; the privacy preserving system applying the proposed method successfully can also decrease elapsed time. Hence, the method is very practical in establishing privacy preserving context-aware services. Our future research issues taking into account some limitations in this paper can be summarized as follows. First, user acceptance or usability will be tested with actual users in order to prove the value of the prototype system. Second, we will apply the proposed method to more general application domains as this paper focused on tourism in amusement park.

An Empirical Study on the Influencing Factors of Perceived Job Performance in the Context of Enterprise Mobile Applications (업무성과에 영향을 주는 업무용 모바일 어플리케이션의 주요 요인에 관한 연구)

  • Chung, Sunghun;Kim, Kimin
    • Asia pacific journal of information systems
    • /
    • v.24 no.1
    • /
    • pp.31-50
    • /
    • 2014
  • The ubiquitous accessibility of information through mobile devices has led to an increased mobility of workers from their fixed workplaces. Market researchers estimate that by 2016, 350 million workers will be using their smartphones for business purposes, and the use of smartphones will offer new business benefits. Enterprises are now adopting mobile technologies for numerous applications to increase their operational efficiency, improve their responsiveness and competitiveness, and cultivate their innovativeness. For these reasons, various organizational aspects concerning "mobile work" have received a great deal of recent attention. Moreover, many CIOs plan to allocate a considerable amount of their budgets mobile work environments. In particular, with the consumerization of information technology, enterprise mobile applications (EMA) have played a significant role in the explosive growth of mobile computing in the workplace, and even in improving sales for firms in this field. EMA can be defined as mobile technologies and role-based applications, as companies design them for specific roles and functions in organizations. Technically, EMA can be defined as business enterprise systems, including critical business functions that enable users to access enterprise systems via wireless mobile devices, such as smartphones or tablets. Specifically, EMA enables employees to have greater access to real-time information, and provides them with simple features and functionalities that are easy for them to complete specific tasks. While the impact of EMA on organizational workers' productivity has been given considerable attention in various literatures, relatively little research effort has been made to examine how EMA actually lead to users' job performance. In particular, we have a limited understanding of what the key antecedents are of such an EMA usage outcome. In this paper, we focus on employees' perceived job performance as the outcome of EMA use, which indicates the successful role of EMA with regard to employees' tasks. Thus, to develop a deeper understanding of the relationship among EMA, its environment, and employees' perceived job performance, we develop a comprehensive model that considers the perceived-fit between EMA and employees' tasks, satisfaction on EMA, and the organizational environment. With this model, we try to examine EMA to explain how job performance through EMA is revealed from both the task-technology fit for EMA and satisfaction on EMA, while also considering the antecedent factors for these constructs. The objectives of this study are to address the following research questions: (1) How can employees successfully manage EMA in order to enhance their perceived job performance? (2) What internal and/or external factors are important antecedents in increasing EMA users' satisfaction on MES and task-technology fit for EMA? (3) What are the impacts of organizational (e.g. organizational agility), and task-related antecedents (e.g., task mobility) on task-technology fit for EMA? (4) What are the impacts of internal (e.g., self-efficacy) and external antecedents (e.g., system reputation) for the habitual use of EMA? Based on a survey from 254 actual employees who use EMA in their workplace across industries, our results indicate that task-technology fit for EMA and satisfaction on EMA are positively associated with job performance. We also identify task mobility, organizational agility, and system accessibility that are found to be positively associated with task-technology fit for EMA. Further, we find that external factor, such as the reputation of EMA, and internal factor, such as self-efficacy for EMA that are found to be positively associated with the satisfaction of EMA. The present findings enable researchers and practitioners to understand the role of EMA, which facilitates organizational workers' efficient work processes, as well as the importance of task-technology fit for EMA. Our model provides a new set of antecedents and consequence variables for a TAM involving mobile applications. The research model also provides empirical evidence that EMA are important mobile services that positively influence individuals' performance. Our findings suggest that perceived organizational agility and task mobility do have a significant influence on task-technology fit for EMA usage through positive beliefs about EMA, that self-efficacy and system reputation can also influence individuals' satisfaction on EMA, and that these factors are important contingent factors for the impact of system satisfaction and perceived job performance. Our findings can help managers gauge the impact of EMA in terms of its contribution to job performance. Our results provide an explanation as to why many firms have recently adopted EMA for efficient business processes and productivity support. Our findings additionally suggest that the cognitive fit between task and technology can be an important requirement for the productivity support of EMA. Further, our study findings can help managers in formulating their strategies and building organizational culture that can affect employees perceived job performance. Managers, thus, can tailor their dependence on EMA as high or low, depending on their task's characteristics, to maximize the job performance in the workplace. Overall, this study strengthens our knowledge regarding the impact of mobile applications in organizational contexts, technology acceptance and the role of task characteristics. To conclude, we hope that our research inspires future studies exploring digital productivity in the workplace and/or taking the role of EMA into account for employee job performance.

Occurrence and Molecular Phylogenetic Characteristics of Benthic Sand-dwelling Dinoflagellates in the Intertidal Flat of Dongho, West Coast of Korea (서해안 동호 사질 조간대에 서식하는 저서성 와편모류의 출현양상 및 분자계통학적 특성)

  • KIM, SUNJU;YOON, JIHAE;PARK, MYUNG GIL
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.20 no.3
    • /
    • pp.141-150
    • /
    • 2015
  • Dinoflagellates are ubiquitous and important primary producers in the oceans. They have diverse trophic modes, i.e., phototrophic, heterotrophic, and mixotrophic modes and thereby, play important ecological role in marine microbial food-web. While many studies have been focused on planktonic dinoflagellates in pelagic ecosystems, benthic, sand-dwelling dinoflagellates that inhabit in intertidal zone have been very poorly documented worldwide. We investigated biodiversity, occurrence, and molecular phylogeny of benthic, sand-dwelling dinoflagellates from the intertidal flat of Dongho, west coast of Korea during low-tide, monthly from November 2012 to February 2014. About 27 species of 13 genera in orders Gonyaulacales, Gymnodiniales, Peridiniales, Prorocentrales have been identified, of which members in the genus Amphidinium constituted a major part of the sand-dwelling dinoflagellates in this area. A total of 34 isolates from 16 species of the sand-dwelling dinoflagellates were isolated from Dongho, Mohang, Gamami, and Songho in the west coast and Hyupjae in Jeju of Korea, their 28S rDNA sequences were successfully amplified, and applied for molecular phylogenetic analyses. In the 28S rDNA phylogeny, Amphidinium species diverged across three major clusters within the order Gymnodiniales and formed polyphyletic group. Based on the unambiguously aligned partial 28S rDNA sequences including variable D2 region, the genotypes of Amphidinium mootonorum Korean strains greatly differed from that of Canadian strain with 19.2% of pairwise nucleotide difference, suggesting that further ultrastructural studies may provide additional characters to clearly separate these genotypes. Two potential toxic species, Amphidinium carterae and A. operculatum appeared occasionally during this study. Quantitative assessment and toxicity of those species should be addressed in the future.

Immunocytochemistry of Metallothionein Expression in Developing Rat Liver (발생중인 흰쥐 간에서의 Metallothionein 발현에 관한 면역세포화학적 연구)

  • Oh, Seung-Han;Ahn, Young-Mo;Shin, Kil-Sang;Kim, Wan-Jong
    • Applied Microscopy
    • /
    • v.34 no.3
    • /
    • pp.171-178
    • /
    • 2004
  • Metallothionein (MT) is a family of ubiquitous, low molecular weight (6-7 kDa), cysteine-rich protein with a high affinity to metal ions and has no aromatic amino acids and histidine. Some of the known functions of MT include detoxification of heavy metals and alkylating agents and neutralization of free radicals. Also, this protein may affect a number of cellular processes including gene expression, apoptosis, proliferation and differentiation. But, its actual functions are still not clear. The present study was undertaken to examine immunocytochemically the localization of MT in developing rat liver. On the day 11 of gestation, the fetal rat liver has already been formed and contained numerous oval cells with high nuclear cytoplasmic ratio, which were the progenitors of hepatic parenchymal cells, but no reaction products of MT were detected at this time. And then, positive reactions against MT started to appear predominantly in the parenchymal cells of liver from the 13th day after gestation. Reaction products, immunogold particles or brown coloration, were localized at both the nucleus and the cytoplasm of the parenchymal cells, except mitochondria. The intensity of this reaction gradually increased, and exhibited the strongest at birth. The intensity of MT staining and immunogold labelling diminished with growth, and by the 15th day after birth weak positive reaction was observed in the cells. In brief, positive reactions for MT were observed in the oval cells and the parenchymal cells during fetal stage, meanwhile they were present only in the parenchymal cells after birth. The present results suggest that MT possibly involves parechymal cell proliferation and differentiation through the storage or the supply of various metal ions in the developing rat liver.

Helicobacter pylori Infection and Gastroduodenal Pathology in Children with Upper Gastrointestinal Symptoms (상부 위장관 증세가 있는 소아의 위십이지장병변 및 Helicobacter pylori 감염)

  • Yoon, Young-Ran;Kim, Mi-Ryeung;Lim, Jae-Young;Choi, Myoung-Bum;Park, Chan-Hoo;Woo, Hyang-Ok;Youn, Hee-Shang;Ko, Gyung-Hyuck;Kang, Hyung-Lyun;Baik, Seung-Chul;Lee, Woo-Kon;Cho, Myung-Je;Rhee, Kwang-Ho
    • Pediatric Gastroenterology, Hepatology & Nutrition
    • /
    • v.6 no.2
    • /
    • pp.103-111
    • /
    • 2003
  • Purpose: This study was undertaken to evaluate the gastroduodenal pathology and Helicobacter pylori infection in children with upper gastrointestinal symptoms. Methods: One hundred and seven pediatric patients with upper gastrointestinal symptoms were undergone endoscopy at the Gyeongsang National University Hospital from June 1990 to April 1991. Histopathologic examination was done by H & E staining of gastric antral biopsy specimen and gastritis was defined according to the Sydney System. Tissue H. pylori status was evaluated with the urease test using Christensen's urea broth and H & E or Warthin-Starry silver staining of gastric antral biopsy specimen. IgG Immunoblotting were also performed to detect specific anti-H. pylori antibody in these patients. Results: The reasons for endoscopy were recurrent abdominal pain, acute abdominal pain, sallow face, hunger pain, and frequent nausea. Variable degrees of gastric mucosal hyperemia were found in most of the patients. Gastric hemorrhagic spots, gastric ulcer, duodenal ulcer, duodenal erosion, and hemorrhagic duodenitis were rare endoscopic findings. Histologic chronic gastritis was found in 88% of 107 patients. Histologic chronic duodenitis was observed in all 99 patients whose tissue were available. Gastric tissue H. pylori was positive in 57% of 107 patients by one of the ureasetest, H & E staining and Warthin-Starry silver staining. However, gastric tissue H. pylori detection rate was lower in the younger age groups. Anti-H. pylori IgG antibodies were detectable in 96% of 107 patients. Conclusion: Chronic gastroduodenitis and anti-H. pylori IgG antibody were ubiquitous in children with upper gastrointestinal symptoms.

  • PDF

A Study On Design of ZigBee Chip Communication Module for Remote Radiation Measurement (원격 방사선 측정을 위한 ZigBee 원칩형 통신 모듈 설계에 대한 연구)

  • Lee, Joo-Hyun;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.18 no.4
    • /
    • pp.552-558
    • /
    • 2014
  • This paper suggests how to design a ZigBee-chip-based communication module to remotely measure radiation level. The suggested communication module consists of two control processors for the chip as generally required to configure a ZigBee system, and one chip module to configure a ZigBee RF device. The ZigBee-chip-based communication module for remote radiation measurement consists of a wireless communication controller; sensor and high-voltage generator; charger and power supply circuit; wired communication part; and RF circuit and antenna. The wireless communication controller is to control wireless communication for ZigBee and to measure radiation level remotely. The sensor and high-voltage generator generates 500 V in two consecutive series to amplify and filter pulses of radiation detected by G-M Tube. The charger and power supply circuit part is to charge lithium-ion battery and supply power to one-chip processors. The wired communication part serves as a RS-485/422 interface to enable USB interface and wired remote communication for interfacing with PC and debugging. RF circuit and antenna applies an RLC passive component for chip antenna to configure BALUN and antenna impedance matching circuit, allowing wireless communication. After configuring the ZigBee-chip-based communication module, tests were conducted to measure radiation level remotely: data were successfully transmitted in 10-meter and 100-meter distances, measuring radiation level in a remote condition. The communication module allows an environment where radiation level can be remotely measured in an economically beneficial way as it not only consumes less electricity but also costs less. By securing linearity of a radiation measuring device and by minimizing the device itself, it is possible to set up an environment where radiation can be measured in a reliable manner, and radiation level is monitored real-time.

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF