• 제목/요약/키워드: cyber resistance

검색결과 24건 처리시간 0.032초

SF 영화에 나타난 가죽 의상의 사이버 레지스탕스 미학 연구 -"Matrix I","Matrix II Reloaded"를 중심으로 - (A Study on the Cyber Resistance Aesthetics of Leather Clothes - Focused on the Movie "Matrix I","Matrix II Reloaded"-)

  • 김지선;염혜정
    • 복식
    • /
    • 제54권2호
    • /
    • pp.66-78
    • /
    • 2004
  • A leather clothes which was a representative item of an existed resistant image created a new esthetics. Cyber Resistance, being mixed with the highlighted cyber image in these days. Especially. the image of such new leather clothes appears apparently in SF movies. The purpose of this study is to examine this new esthetics through the leather clothes of the movie. $\ulcorner$Matrix$\urcorner$. currently becoming the subject of a conversation and affecting to a popular culture and the fashion and to help to the design idea of a unique leather clothes. The result of analyzing of the character in the movie is following. Trinity shows herself as a woman warrior by wearing tight black leather suit. Morpheus is described as a vague character with his old fashioned suit and leather trench coat. while Niobe carries an image of rebellious cyber warrior in her leather suit with unique texture. In addition. leather clothes on $\ulcorner$Matrix$\urcorner$ got the name of Matrix look and became a main theme in fashion collection. We can feel 'Cyber Resistance' esthetics in that leather clothes through the movie and fashion collection and summarize into three following features, First. it's grafted into the dichotomous value by progress and return as a retro futurism. Second. it moderately express a rebellious image of punk into a cyber image. Third. it makes cyber warrior's image that is neutralized mixing military and fetish properly.

영화에 표현된 사이버 펑크패션에 관한 연구 (A Study on Cyber Punk Fashion Expressed in the Movies)

  • 정연자
    • 한국의상디자인학회지
    • /
    • 제7권3호
    • /
    • pp.181-188
    • /
    • 2005
  • This study attempted to investigate the plastic characteristics of cyber punk fashion with a focus on fashion in the cyber punk movies in order to inquire into how the influence of the cyber punk taking the lead in the spiritual culture and way of life of the humankind in the 21th century would be expressed in fashion. For this purpose, it sought to analyze the beauty of new fashion creating the cyber environment and identify its contemporary meaning. An attempt was made to investigate the image of cyber punk fashion with a focus on fashion expressed in the cyber punk movies. As a result, the following findings were obtained: First, the image of cyber punk fashion expressed in the cyber punk movies was simplicity, which was to express the modest silhouette and details exclusive of decoration. In addition to clean and smooth gloss, it contained the modest image of resistance', not 'revolt' by borrowing the partial motive and image from existing punk fashion. The change of cyber punk fashion into the characteristic of concise, smooth external appearance brought about the restraint of its image and symbolism as well as its plastic characteristic. Second, it was characterized by the Eroticism nature of emphasizing the body line while expressing the future and modest image or exposing the body. Cyber punk fashion expressed the avant-garde image by using materials that gave a mysterious and future feelings, as well as unsymmetrical silhouette, the slit of body-conscious line, coarse cutting, the method of do-constructing and reconstructing the silhouette, the method of applying diverse underwears such as corset, brassiere and the like. Third, cyber punk fashion was marked by the nature of mined sex. It had the masculine image by using the black color containing the image of masculinity and resistance in female clothing and expressing the suit, coat and military looks giving an masculine impression. And it expressed the image of mixed sexes with the masculine image in male clothing by borrowing feminine images such as body-conscious line, widely cut neckline, floral decoration, leggings and the like. Fourth, cyber punk fashion was marked by naturalness. It was expressed as clothing made from silhouette, knit, cotton and the like in the atmosphere expressing love, comfortableness and truth. This contained the image of naturalness, a return to the primitive, that human being wanted to return to their original figure in the future element. The cyber punk movie may contain a dismal, gloomy future image on the whole, which can be overcome, and shows the possibility that it may grow into the alternative culture, not the revolting culture. The movie of 'The Fifth Element' demonstrates the meaning and role that shows the bright future image. It is thought that designers should make efforts for cyber punk fashion to perform its role in changing the gloomy future image into the bright image of society

  • PDF

디지털시대 패션에 나타난 사이버페미니즘 연구(제1보) -사이버하위문화 스타일을 중심으로- (A Study of Cyberfeminism in fashion in the digital era -Focused on cybersubculture style (Part I)-)

  • 김현수;양숙희
    • 한국의류학회지
    • /
    • 제27권11호
    • /
    • pp.1229-1240
    • /
    • 2003
  • The purpose of this study was to review such results of the scientific and technological development as women's changed status, sexual identity and their views of physique in the cyber space based on cyber feminists' theories, and thereby, examine the concept of space during the medieval age, and then, the fundamental spiritual concept involving the fetishism of women's body as sexual objects in the materialistic space of the digital age in terms of the consciousness of trend or supra-sensual perceptions, and thereby, review the effect of the cyber terrorism and violence on the fashion in sub-cultural terms. Some researchers distinguish psychedelic styles from cyberdelic ones to assume such psychiatric visions as psychedelic fashion characterized by resistance and delinquency-cyber punk fashion, cyber hippie fashion, cyborg fashion- and then, define them all as cyber resistant culture fashion or as a sub-cultural style of the cyber culture. As a result, it was found that human bodies are being encoded with the networks, various cyber characters or avatars are emerging, while human bodies are being distorted or exaggerated with human beings and machines being imploded.

현대패션에 포함된 게임 캐릭터 의상의 조형성 (The Ways in which Clothes worn by Game Characters as Expressed in Contemporary Fashion)

  • 이효진;양아랑
    • 복식
    • /
    • 제58권4호
    • /
    • pp.86-98
    • /
    • 2008
  • This study is purposed to determine the correlation between contemporary fashion and game characters' clothes and to analyze the formative property of the game characters' clothes expressed in the contemporary fashion. The temporal scope of this study is from 2004 to 2007 based on general online game ranks, while the game type is limited to 3D-online role playing game. The most popular clothes of game characters are analyzed and found to have imaginary, sensualistic, and cross-sexual features. These are also expressed as Cyber resistance image, Femme fatal image and Asexual image in the contemporary fashion. Firstly, the Cyber resistance image in the recent fashion is shown as belligerent, destructive and surrealistic image in contemporary fashion. Secondly, the Femme fatal image represents bewitching, brutal and narcissistic image with sleek materials and glowing colors in contemporary fashion. Thirdly, the Asexual image means the concept of sex as the neuter gender. Especially, this image has been introduced by simple and straight silhouette, black, silver, khaki colors in fashion. Accordingly, the clothes of game characters with the popularity and formative property have close correlation with contemporary fashion even if they do not pursue for practical creativity. In this respect, they can consolidate the position as a new fashion trend if they are developed with various design ideas.

Business Process Reengineering of an Information Exchange Management System for a Nationwide Cyber Threat Intelligence

  • Pramadi, Yogha Restu;Rosmansyah, Yousep;Kim, Myonghee;Park, Man-Gon
    • 한국멀티미디어학회논문지
    • /
    • 제20권2호
    • /
    • pp.279-288
    • /
    • 2017
  • Nowadays, nations cyber security capabilities play an important role in a nation's defense. Security-critical infrastructures such as national defenses, public services, and financial services are now exposed to Advanced Persistent Threats (APT) and their resistance to such attacks effects the nations stability. Currently Cyber Threat Intelligence (CTI) is widely used by organizations to mitigate and deter APT for its ability to proactively protect their assets by using evidence-based knowledge. The evidence-based knowledge information can be exchanged among organizations and used by the receiving party to strengthen their cyber security management. This paper will discuss on the business process reengineering of the CTI information exchange management for a nationwide scaled control and governance by the government to better protect their national information security assets.

Innovation Resistance In a Smart Phone Environment : A Technology Acceptance Model Approach

  • Shin, Min-Soo;Yum, Ji-Hwan
    • Journal of Information Technology Applications and Management
    • /
    • 제18권4호
    • /
    • pp.169-181
    • /
    • 2011
  • The study developed the ideas of innovation resistance attitude in view of innovation delay, rejection, and objection. Authors developed the idea of innovation resistance attitudes of customers in view of innovation diffusion process. The study categorized the idea of resistance such as delay, rejection, and objection. The study hired the structural equation modeling to evaluate the relationships among the consumers' subjective variables such as incongruence, uncertainty, perceived performance, peer usage, and tradition orientation those were factored out by the survey test. These measured variables were analyzed into the innovation resistance related latent variables. The study provides the basic treatment to introduce new technologies and products to the superficially resisting customers. Those resisting customers might be future late adopters. The research results provide the basic arguments for prerequisite treatment to introduce smart phone in the global market place.

An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks

  • Zhang, Xiaojun;Mu, Liming;Zhao, Jie;Xu, Chunxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권6호
    • /
    • pp.3280-3298
    • /
    • 2019
  • Vehicular ad-hoc networks (VANETs) have become increasingly significant in intelligent transportation systems, they play a great role in improving traffic safety and efficiency. In the deployment of intelligent VANETs, intelligent vehicles can efficiently exchange important or urgent traffic information and make driving decisions. Meanwhile, secure data communication and vehicle's identity privacy have been highlighted. To cope with these security issues, in this paper, we construct an efficient anonymous authentication scheme with secure communication in intelligent VANETs. Combing the ElGamal encryption technique with a modified Schnorr signature technique, the proposed scheme provides secure anonymous authentication process for encrypted message in the vehicle-to-infrastructure communication model, and achieves identity privacy, forward security, and reply attack resistance simultaneously. Moreover, except the trusted authority (TA), any outside entity cannot trace the real identity of an intelligent vehicle. The proposed scheme is designed on an identity-based system, which can remove the costs of establishing public key infrastructure (PKI) and certificates management. Compared with existing authentication schemes, the proposed scheme is much more practical in intelligent VANETs.

기업의 사이버위협정보 공유 활성화에 관한 연구 (A Study on the Activation of Sharing Cyber-Threat Information among Businesses)

  • 최석언;이종섭;탁근선;최주원
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제12권4호
    • /
    • pp.143-156
    • /
    • 2023
  • 급변하는 사이버 환경에서 다양한 유형으로 발생하는 보안위협에 상응하기 위한 국내 위협정보 공유체계는 미흡한 상황이다. 본 연구에서는 이러한 문제를 해결하고 위협정보 공유 활성화를 제고시키고자, 정보 공유 시 핵심 요인을 가치기반수용모델(VAM) 기반으로 연구모델을 도출하고 정보보호 관련 종사자들 총 204명 대상으로 리커드 5점 척도 설문조사를 수행한 후 1차 151명의 통계결과를 SPSS와 AMOS를 활용하여 분석을 수행하고 2차 204명의 통계결과를 R-Studio를 통해 추가 검증하였다. 이를 통하여 사이버위협정보 공유 활성화 핵심요인으로 지각된 용이성이 유의미한 영향을 미치고 있으며(β=0.405, p<0.01), 저해요인은 혁신 저항으로 분석되었다(β=-0.152, p<0.01). 도출된 연구 결과는 미시적으로 향후 기업의 사어버 위협정보 공유의 활성화를 위한 요인 분석 시 활용과 거시적으로 국가 사이버위협 대응체계의 기반 조성에 기여할 수 있겠다.

Design and implementation of an improved MA-APUF with higher uniqueness and security

  • Li, Bing;Chen, Shuai;Dan, Fukui
    • ETRI Journal
    • /
    • 제42권2호
    • /
    • pp.205-216
    • /
    • 2020
  • An arbiter physical unclonable function (APUF) has exponential challenge-response pairs and is easy to implement on field-programmable gate arrays (FPGAs). However, modeling attacks based on machine learning have become a serious threat to APUFs. Although the modeling-attack resistance of an MA-APUF has been improved considerably by architecture modifications, the response generation method of an MA-APUF results in low uniqueness. In this study, we demonstrate three design problems regarding the low uniqueness that APUF-based strong PUFs may exhibit, and we present several foundational principles to improve the uniqueness of APUF-based strong PUFs. In particular, an improved MA-APUF design is implemented in an FPGA and evaluated using a well-established experimental setup. Two types of evaluation metrics are used for evaluation and comparison. Furthermore, evolution strategies, logistic regression, and K-junta functions are used to evaluate the security of our design. The experiment results reveal that the uniqueness of our improved MA-APUF is 81.29% (compared with that of the MA-APUF, 13.12%), and the prediction rate is approximately 56% (compared with that of the MA-APUF (60%-80%).

제연구역 출입문 개방 각도에 따른 폐쇄력에 관한 연구 (A Study on the Closing Force according to the Opening Angle of the Door in the Smoke Control System)

  • 오원신;정석환
    • 대한안전경영과학회지
    • /
    • 제23권4호
    • /
    • pp.43-48
    • /
    • 2021
  • In this study, the experiment was conducted on a fire door(W × H = 0.98 m × 2.19 m) installed on the vestibule. The effective leakage area for each opening angles and closing forces derived from the impulse-momentum equation was compared and analyzed with the experimental results. As a result of the experiment, the major factors affecting the door closing forces were the pressure difference and the area of the door. The difference of door closing forces between measured and calculated values by the impulse-momentum equation showed a deviation of less than ±15% at the opening angles of 5°to 10°. At the door opening angle of 2.5°, the dynamic pressure was much higher than the measured static pressure, and this pressure difference is estimated to be air resistance acting to prevent the door from being completely closed.