• Title/Summary/Keyword: cyber behavior

Search Result 255, Processing Time 0.029 seconds

A Study Covering the Comparative Analysis of Educational Systems in Major Countries for Regular Cybersecurity Education (사이버보안 정규교육화를 위한 주요국 교육체계 비교분석 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.397-405
    • /
    • 2021
  • With the recent phenomenon of the Intelligence Information Society, the cyber security paradigm has begun to change. In particular, the increase of the interconnectedness of the hyperlinked society has extended the scope of damage that can be caused by cyber threats to the real world. In addition to that, it can also be a risk to any given individual who could accompany a crisis that has to do with public safety or national security. Adolescents who are digital natives are more likely to be exposed to cyber threats, which is mainly due to the fact that they are significantly more involved in cyber activities and they also possess insufficient security comprehension and safety awareness. Therefore, it is necessary to strengthen cyber security capabilities of every young individual, so that they can effectively protect themselves against cyber threats and better manage their cyber activities. It examines the changes of the security paradigm and the necessity for cyber security education, which is in direct accordance to the characteristics of a connected society that further suggests directions and a basic system of cyber security education, through a detailed analysis of the current state of Domestic and Overseas Cyber Security Education. The purpose of this study was to define cybersecurity competencies that are necessary within an intelligent information society, and to propose a regular curriculum for strengthening cybersecurity competencies, through the comparison and meticulous analysis of both domestic and overseas educational systems that are pertinent to cybersecurity competencies. Accordingly, a cybersecurity competency system was constructed, by reflecting C3-Matrix, which is a cyber competency system model of digital citizens. The cybersecurity competency system consists of cyber ethics awareness, cyber ethics behavior, cyber security and cyber safety. In addition to this, based on the basic framework of the cybersecurity competency system, the relevant education that is currently being implemented in the United States, Australia, Japan and Korea were all compared and analyzed. From the insight gained through the analysis, the domestic curriculum was finally presented. The main objective of this new unified understanding, was to create a comprehensive and effective cyber security competency curriculum.

The Effects of Parenting Behavior and Peer Relationships on Adolescent Self-Concept Development (부모의 양육행동과 또래관계가 청소년 자아개념에 미치는 영향)

  • Lee, Sa-Rah;Oh, Yun-Jin
    • Journal of the Korean Home Economics Association
    • /
    • v.46 no.9
    • /
    • pp.113-123
    • /
    • 2008
  • The purpose of this study was to investigate how parenting and peer relationships influence the development of adolescent self-concept by using Structural Equation Modeling(SEM). The subjects were 198 first graders (94 male and 104 female) from four high schools within the Seoul area. Descriptive and comparative statistical analysis was conducted with SPSS (Version10.0), while AMOS (Version 4.0) was used to assess structural equation modelling of parenting, peer relationship and the self-concept. Results showed that, in terms of correlation, more positive parenting behaviors induced more positive self-concept. In addition, better peer relationships demonstrated more positive self-concept. Regression analysis showed that peer relationships explained the variance in adolescents' self-concept more effectively than parenting behavior. This was confirmed by the SEM.

A Study on the Insider Behavior Analysis Using Machine Learning for Detecting Information Leakage (정보 유출 탐지를 위한 머신 러닝 기반 내부자 행위 분석 연구)

  • Kauh, Janghyuk;Lee, Dongho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.1-11
    • /
    • 2017
  • In this paper, we design and implement PADIL(Prediction And Detection of Information Leakage) system that predicts and detect information leakage behavior of insider by analyzing network traffic and applying a variety of machine learning methods. we defined the five-level information leakage model(Reconnaissance, Scanning, Access and Escalation, Exfiltration, Obfuscation) by referring to the cyber kill-chain model. In order to perform the machine learning for detecting information leakage, PADIL system extracts various features by analyzing the network traffic and extracts the behavioral features by comparing it with the personal profile information and extracts information leakage level features. We tested various machine learning methods and as a result, the DecisionTree algorithm showed excellent performance in information leakage detection and we showed that performance can be further improved by fine feature selection.

The Differences of University Student of Cyber Crime Recognition according to Internet Addiction Tendency (대학생의 인터넷 중독 경향에 따른 사이버 범죄인식의 차이)

  • Kim, Joung-Gyu
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.298-304
    • /
    • 2007
  • The purpose of this study was to exam the casual relationship between Internet addiction and cyber crime's recognition of university student. This study summarize three results. First, male student Internet addiction was higher than female student. Second, it was analyzed that internet addiction group recognizes cyber crime averagely higher than general use group. It is understood that according as internet practical use time increases, they recognize much danger that exposed cyber crimie. Third, cyber criminal recognition by internet addiction did multiplex regression analysis. As a result, Internet addiction was analyzed that cyber crime recognition increases according as increasing of addiction level that connected with usually life difficulty and deviation behavior.

  • PDF

Abnormal Behavior Detection for Zero Trust Security Model Using Deep Learning (제로트러스트 모델을 위한 딥러닝 기반의 비정상 행위 탐지)

  • Kim, Seo-Young;Jeong, Kyung-Hwa;Hwang, Yuna;Nyang, Dae-Hun
    • Annual Conference of KIPS
    • /
    • 2021.05a
    • /
    • pp.132-135
    • /
    • 2021
  • 최근 네트워크의 확장으로 인한 공격 벡터의 증가로 외부자뿐 아니라 내부자를 경계해야 할 필요성이 증가함에 따라, 이를 다룬 보안 모델인 제로트러스트 모델이 주목받고 있다. 이 논문에서는 reverse proxy 와 사용자 패턴 인식 AI 를 이용한 제로트러스트 아키텍처를 제시하며 제로트러스트의 구현 가능성을 보이고, 새롭고 효율적인 전처리 과정을 통해 효과적으로 사용자를 인증할 수 있음을 제시한다. 이를 위해 사용자별로 마우스 사용 패턴, 리소스 사용 패턴을 인식하는 딥러닝 모델을 설계하였다. 끝으로 제로트러스트 모델에서 사용자 패턴 인식의 활용 가능성과 확장성을 보인다.

A Detection of Behavior and Emotion for Companion animal using AI (AI 기법을 이용한 반려동물의 행동 및 감정 탐지)

  • Lee, Jeong-Woo;Lee, Ha-Rang;Shin, Dong-Jin;Weon, IL-Yong
    • Annual Conference of KIPS
    • /
    • 2022.11a
    • /
    • pp.580-582
    • /
    • 2022
  • 본 본문은 영상을 통해 반려동물의 행동과 감정을 인식하는 연구이다. 이러한 연구는 반려동물과 인간의 삶을 향상시키는데 도움을 줄 수 있다. 제안된 시스템의 유용성은 실험을 통해 검증하였고, 어느 정도 의미 있는 결과를 얻을 수 있었다.

Analyzing the Positive and the Negative SNS Behaviors of the Elementary and Middle School Students (초.중학생의 SNS에서의 긍정적.부정적 행동 분석)

  • Lee, Soojung;Yeon, Jeong-Hwa
    • Journal of The Korean Association of Information Education
    • /
    • v.17 no.1
    • /
    • pp.1-8
    • /
    • 2013
  • SNS is a social networking service that removes the barrier between cyber spaces and the real world and helps people who have common interests to have a two-way communication, manage their interpersonal relationships and share information. The domestic and international SNS markets have attained a steady growth, and their growth is being more accelerated in recent days. However, studies on SNS have just examined adults, and it's required to research the use of SNS and cyber behaviors via SNS among elementary and middle school students. This study attempted to analyze the relationship of the use of SNS, motivation of using SNS, the use of active SNS functions, SNS-dependent tendency and SNS awareness to cyber behaviors via SNS among elementary and middle school students. As a result, regardless of gender and grade, stealing private information was the most frequent activity and the frequency of 'contacting strangers' activity increased most rapidly with the usage time and grade. SNS dependency turned out to be the most highly correlated with the negative cyber behavior. Moreover, the difference of gender was not significant to the overall negative cyber behavior, whereas that of grade was.

  • PDF

Consumer′s Perception and Buying Behavior through the Shopping Mall -Focused on the Customers of D Cyber Mall- (소비자의 인터넷 쇼핑몰 이용가치와 불안요소 인지 - D백화점 쇼핑몰 고객을 중심으로 -)

  • 홍성희;배미경;서동주
    • Journal of the Korean Home Economics Association
    • /
    • v.40 no.6
    • /
    • pp.69-83
    • /
    • 2002
  • This study examined the effects of demographic variables on buying behavior, and investigated buyers'perceived value and risk perception of the internet shopping mall. The sample was collected by a department store in Daegu, and it included 1,732 individuals using the Cyber Mall. Research methods used in this study were simple statistics, t-test and ANOVA. The buyers perceived values through the internet shopping mall were classified into five categories-price, time, convenience, intrinsic attributes, reliability and the risk perception also was classified such as the overall purchasing process, quality of products, exposure of the personal information, delivery system, refund and exchange. The major findings of this study were 1) most important categories affecting their buying behavior were the value of convenience and following values in order were time, price, reliability, intrinsic attributes. 2) the risk perception were overall purchasing behavior, quality of products, exposure of personal information, delivery, and refund & exchange in order. 3) age of buyers, buying experience on the internet shopping mall, and gender were the important factors affecting the buyers'perceived value and risk. 4) the study also, showed that according to the variety of products, buyers perceived the value and risk differently, for example, the price was the most important perceived value in case of food product. The implication of the study is to strategically suggest how to enhance the buyers'perceived value and diminish perceived risk of different products.

CyberClass Avatar System using Task-Level Behavior Description Language (작업 수준의 행위 표현 언어를 이용한 사이버강의용 아바타 시스템)

  • Kim, Jung-Hee;Lim, Soon-Bum
    • The KIPS Transactions:PartB
    • /
    • v.11B no.5
    • /
    • pp.597-602
    • /
    • 2004
  • In spite of recent increase in the use of avatar systems in Web and Virtual Reality, there has not been a service that allows users to control directly the avatar behaviors. In addition, the conventional behavior control languages required a lot of complicated information for controlling the behaviors, so that users had difficulty using them. To apply written languages to a different task domain, moreover, it was necessary to modify or rewrite the languages. In this paper, for the avatar behavior control more simply define, “Task-Level Behavior Description Language,” which allows description the avatar behaviors in each task domain and “Motion Representation Language,” which enables writing detailed data for motion control. The system, developed in this paper, “included an Interpreter,” which automatically creates the Motion Representation Language, allowing users to easily control the avatar behaviors simply with the Behavior Description Language. The system was also applied to cyber classes, and the Task-level Behavior Description Language was compared with conventional languages to see how it was more effective in behavior description.

Self-expression Behavior of Smartphone Through In-depth Interview: Focused on Younger Generation Users

  • Lee, SeungMin
    • Journal of the Semiconductor & Display Technology
    • /
    • v.16 no.1
    • /
    • pp.86-90
    • /
    • 2017
  • Today's young generation users are very active in expressing themselves through smart phones, form networks in this cyber space and express their identities freely. Therefore, this study aims to investigate how young people in their 20s are expressing themselves through smart phones and the differences from the attempt of self-expression in the existing cyber space. The research method was an in-depth interview, which was a qualitative research method, aimed at people in their 20s, so that they could freely talk about their thoughts and feelings. In-depth interviews are useful for users' psychological and in-depth analysis of behavior.

  • PDF