• Title/Summary/Keyword: cyber resistance

Search Result 24, Processing Time 0.032 seconds

A Study on the Cyber Resistance Aesthetics of Leather Clothes - Focused on the Movie "Matrix I","Matrix II Reloaded"- (SF 영화에 나타난 가죽 의상의 사이버 레지스탕스 미학 연구 -"Matrix I","Matrix II Reloaded"를 중심으로 -)

  • 김지선;염혜정
    • Journal of the Korean Society of Costume
    • /
    • v.54 no.2
    • /
    • pp.66-78
    • /
    • 2004
  • A leather clothes which was a representative item of an existed resistant image created a new esthetics. Cyber Resistance, being mixed with the highlighted cyber image in these days. Especially. the image of such new leather clothes appears apparently in SF movies. The purpose of this study is to examine this new esthetics through the leather clothes of the movie. $\ulcorner$Matrix$\urcorner$. currently becoming the subject of a conversation and affecting to a popular culture and the fashion and to help to the design idea of a unique leather clothes. The result of analyzing of the character in the movie is following. Trinity shows herself as a woman warrior by wearing tight black leather suit. Morpheus is described as a vague character with his old fashioned suit and leather trench coat. while Niobe carries an image of rebellious cyber warrior in her leather suit with unique texture. In addition. leather clothes on $\ulcorner$Matrix$\urcorner$ got the name of Matrix look and became a main theme in fashion collection. We can feel 'Cyber Resistance' esthetics in that leather clothes through the movie and fashion collection and summarize into three following features, First. it's grafted into the dichotomous value by progress and return as a retro futurism. Second. it moderately express a rebellious image of punk into a cyber image. Third. it makes cyber warrior's image that is neutralized mixing military and fetish properly.

A Study on Cyber Punk Fashion Expressed in the Movies (영화에 표현된 사이버 펑크패션에 관한 연구)

  • Jung Yeoun-Ja
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.7 no.3
    • /
    • pp.181-188
    • /
    • 2005
  • This study attempted to investigate the plastic characteristics of cyber punk fashion with a focus on fashion in the cyber punk movies in order to inquire into how the influence of the cyber punk taking the lead in the spiritual culture and way of life of the humankind in the 21th century would be expressed in fashion. For this purpose, it sought to analyze the beauty of new fashion creating the cyber environment and identify its contemporary meaning. An attempt was made to investigate the image of cyber punk fashion with a focus on fashion expressed in the cyber punk movies. As a result, the following findings were obtained: First, the image of cyber punk fashion expressed in the cyber punk movies was simplicity, which was to express the modest silhouette and details exclusive of decoration. In addition to clean and smooth gloss, it contained the modest image of resistance', not 'revolt' by borrowing the partial motive and image from existing punk fashion. The change of cyber punk fashion into the characteristic of concise, smooth external appearance brought about the restraint of its image and symbolism as well as its plastic characteristic. Second, it was characterized by the Eroticism nature of emphasizing the body line while expressing the future and modest image or exposing the body. Cyber punk fashion expressed the avant-garde image by using materials that gave a mysterious and future feelings, as well as unsymmetrical silhouette, the slit of body-conscious line, coarse cutting, the method of do-constructing and reconstructing the silhouette, the method of applying diverse underwears such as corset, brassiere and the like. Third, cyber punk fashion was marked by the nature of mined sex. It had the masculine image by using the black color containing the image of masculinity and resistance in female clothing and expressing the suit, coat and military looks giving an masculine impression. And it expressed the image of mixed sexes with the masculine image in male clothing by borrowing feminine images such as body-conscious line, widely cut neckline, floral decoration, leggings and the like. Fourth, cyber punk fashion was marked by naturalness. It was expressed as clothing made from silhouette, knit, cotton and the like in the atmosphere expressing love, comfortableness and truth. This contained the image of naturalness, a return to the primitive, that human being wanted to return to their original figure in the future element. The cyber punk movie may contain a dismal, gloomy future image on the whole, which can be overcome, and shows the possibility that it may grow into the alternative culture, not the revolting culture. The movie of 'The Fifth Element' demonstrates the meaning and role that shows the bright future image. It is thought that designers should make efforts for cyber punk fashion to perform its role in changing the gloomy future image into the bright image of society

  • PDF

A Study of Cyberfeminism in fashion in the digital era -Focused on cybersubculture style (Part I)- (디지털시대 패션에 나타난 사이버페미니즘 연구(제1보) -사이버하위문화 스타일을 중심으로-)

  • 김현수;양숙희
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.27 no.11
    • /
    • pp.1229-1240
    • /
    • 2003
  • The purpose of this study was to review such results of the scientific and technological development as women's changed status, sexual identity and their views of physique in the cyber space based on cyber feminists' theories, and thereby, examine the concept of space during the medieval age, and then, the fundamental spiritual concept involving the fetishism of women's body as sexual objects in the materialistic space of the digital age in terms of the consciousness of trend or supra-sensual perceptions, and thereby, review the effect of the cyber terrorism and violence on the fashion in sub-cultural terms. Some researchers distinguish psychedelic styles from cyberdelic ones to assume such psychiatric visions as psychedelic fashion characterized by resistance and delinquency-cyber punk fashion, cyber hippie fashion, cyborg fashion- and then, define them all as cyber resistant culture fashion or as a sub-cultural style of the cyber culture. As a result, it was found that human bodies are being encoded with the networks, various cyber characters or avatars are emerging, while human bodies are being distorted or exaggerated with human beings and machines being imploded.

The Ways in which Clothes worn by Game Characters as Expressed in Contemporary Fashion (현대패션에 포함된 게임 캐릭터 의상의 조형성)

  • Lee, Hyo-Jin;Yang, A-Rang
    • Journal of the Korean Society of Costume
    • /
    • v.58 no.4
    • /
    • pp.86-98
    • /
    • 2008
  • This study is purposed to determine the correlation between contemporary fashion and game characters' clothes and to analyze the formative property of the game characters' clothes expressed in the contemporary fashion. The temporal scope of this study is from 2004 to 2007 based on general online game ranks, while the game type is limited to 3D-online role playing game. The most popular clothes of game characters are analyzed and found to have imaginary, sensualistic, and cross-sexual features. These are also expressed as Cyber resistance image, Femme fatal image and Asexual image in the contemporary fashion. Firstly, the Cyber resistance image in the recent fashion is shown as belligerent, destructive and surrealistic image in contemporary fashion. Secondly, the Femme fatal image represents bewitching, brutal and narcissistic image with sleek materials and glowing colors in contemporary fashion. Thirdly, the Asexual image means the concept of sex as the neuter gender. Especially, this image has been introduced by simple and straight silhouette, black, silver, khaki colors in fashion. Accordingly, the clothes of game characters with the popularity and formative property have close correlation with contemporary fashion even if they do not pursue for practical creativity. In this respect, they can consolidate the position as a new fashion trend if they are developed with various design ideas.

Business Process Reengineering of an Information Exchange Management System for a Nationwide Cyber Threat Intelligence

  • Pramadi, Yogha Restu;Rosmansyah, Yousep;Kim, Myonghee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.2
    • /
    • pp.279-288
    • /
    • 2017
  • Nowadays, nations cyber security capabilities play an important role in a nation's defense. Security-critical infrastructures such as national defenses, public services, and financial services are now exposed to Advanced Persistent Threats (APT) and their resistance to such attacks effects the nations stability. Currently Cyber Threat Intelligence (CTI) is widely used by organizations to mitigate and deter APT for its ability to proactively protect their assets by using evidence-based knowledge. The evidence-based knowledge information can be exchanged among organizations and used by the receiving party to strengthen their cyber security management. This paper will discuss on the business process reengineering of the CTI information exchange management for a nationwide scaled control and governance by the government to better protect their national information security assets.

Innovation Resistance In a Smart Phone Environment : A Technology Acceptance Model Approach

  • Shin, Min-Soo;Yum, Ji-Hwan
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.4
    • /
    • pp.169-181
    • /
    • 2011
  • The study developed the ideas of innovation resistance attitude in view of innovation delay, rejection, and objection. Authors developed the idea of innovation resistance attitudes of customers in view of innovation diffusion process. The study categorized the idea of resistance such as delay, rejection, and objection. The study hired the structural equation modeling to evaluate the relationships among the consumers' subjective variables such as incongruence, uncertainty, perceived performance, peer usage, and tradition orientation those were factored out by the survey test. These measured variables were analyzed into the innovation resistance related latent variables. The study provides the basic treatment to introduce new technologies and products to the superficially resisting customers. Those resisting customers might be future late adopters. The research results provide the basic arguments for prerequisite treatment to introduce smart phone in the global market place.

An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks

  • Zhang, Xiaojun;Mu, Liming;Zhao, Jie;Xu, Chunxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3280-3298
    • /
    • 2019
  • Vehicular ad-hoc networks (VANETs) have become increasingly significant in intelligent transportation systems, they play a great role in improving traffic safety and efficiency. In the deployment of intelligent VANETs, intelligent vehicles can efficiently exchange important or urgent traffic information and make driving decisions. Meanwhile, secure data communication and vehicle's identity privacy have been highlighted. To cope with these security issues, in this paper, we construct an efficient anonymous authentication scheme with secure communication in intelligent VANETs. Combing the ElGamal encryption technique with a modified Schnorr signature technique, the proposed scheme provides secure anonymous authentication process for encrypted message in the vehicle-to-infrastructure communication model, and achieves identity privacy, forward security, and reply attack resistance simultaneously. Moreover, except the trusted authority (TA), any outside entity cannot trace the real identity of an intelligent vehicle. The proposed scheme is designed on an identity-based system, which can remove the costs of establishing public key infrastructure (PKI) and certificates management. Compared with existing authentication schemes, the proposed scheme is much more practical in intelligent VANETs.

A Study on the Activation of Sharing Cyber-Threat Information among Businesses (기업의 사이버위협정보 공유 활성화에 관한 연구)

  • Seokeon Choe;Jongsub Lee;Geunsun Tak;Joowon Choi
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.4
    • /
    • pp.143-156
    • /
    • 2023
  • The domestic threat information sharing system to deal with various security threats in the rapidly changing cyber environment needs to be improved. In this study, to solve these problems and promote the activation of threat information sharing, we derive a research model based on the value-based containment model (VAM) for vital factors in information sharing. After conducting a Ricardian 5-point survey on a total of 204 individuals, the statistical results of the first 151 individuals were analyzed using SPSS and AMOS, and the statistical results of the second 204 individuals were analyzed using R-Studio. As a result, perceivability was found to have a significant impact as a core factor in the activation of cyber threat information sharing (β=0.405, p<0.01), and the hindrance factor was analyzed as innovation resistance (β=-0.152, p<0.01). Microscopically, the obtained results can be applied to factor analysis for activating information sharing of cyber threats by companies in the future, and macroscopically, they can contribute to the foundational development of a national cyber threat response system.

Design and implementation of an improved MA-APUF with higher uniqueness and security

  • Li, Bing;Chen, Shuai;Dan, Fukui
    • ETRI Journal
    • /
    • v.42 no.2
    • /
    • pp.205-216
    • /
    • 2020
  • An arbiter physical unclonable function (APUF) has exponential challenge-response pairs and is easy to implement on field-programmable gate arrays (FPGAs). However, modeling attacks based on machine learning have become a serious threat to APUFs. Although the modeling-attack resistance of an MA-APUF has been improved considerably by architecture modifications, the response generation method of an MA-APUF results in low uniqueness. In this study, we demonstrate three design problems regarding the low uniqueness that APUF-based strong PUFs may exhibit, and we present several foundational principles to improve the uniqueness of APUF-based strong PUFs. In particular, an improved MA-APUF design is implemented in an FPGA and evaluated using a well-established experimental setup. Two types of evaluation metrics are used for evaluation and comparison. Furthermore, evolution strategies, logistic regression, and K-junta functions are used to evaluate the security of our design. The experiment results reveal that the uniqueness of our improved MA-APUF is 81.29% (compared with that of the MA-APUF, 13.12%), and the prediction rate is approximately 56% (compared with that of the MA-APUF (60%-80%).

A Study on the Closing Force according to the Opening Angle of the Door in the Smoke Control System (제연구역 출입문 개방 각도에 따른 폐쇄력에 관한 연구)

  • Oh, Won-Sin;Joung, Suck-Hwan
    • Journal of the Korea Safety Management & Science
    • /
    • v.23 no.4
    • /
    • pp.43-48
    • /
    • 2021
  • In this study, the experiment was conducted on a fire door(W × H = 0.98 m × 2.19 m) installed on the vestibule. The effective leakage area for each opening angles and closing forces derived from the impulse-momentum equation was compared and analyzed with the experimental results. As a result of the experiment, the major factors affecting the door closing forces were the pressure difference and the area of the door. The difference of door closing forces between measured and calculated values by the impulse-momentum equation showed a deviation of less than ±15% at the opening angles of 5°to 10°. At the door opening angle of 2.5°, the dynamic pressure was much higher than the measured static pressure, and this pressure difference is estimated to be air resistance acting to prevent the door from being completely closed.