• Title/Summary/Keyword: cyber society

Search Result 2,460, Processing Time 0.022 seconds

A Study on the Relationships between Cyber Money Quality and Usage Intention: Focus on the Moderating Effect of Usage Frequency and Amount of Cyber Money

  • Yoon, Jongsoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.5
    • /
    • pp.179-186
    • /
    • 2019
  • While there have been a lots of studies on the use of cyber money, few researches proposed the results on relationships among quality factors, usage intention, and usage characteristics of cyber money in online business environment. Therefore, this study investigates the relationships between cyber money quality and usage intention of cyber money, and examines whether the usage characteristics(frequency, amount) of cyber money has moderating effect on the relationship between cyber money quality and usage intention of cyber money. Firstly, multiple regression analysis tells significant causal relationship between functional and emotional factors of cyber money quality and usage intention of cyber money. Secondly, dummy regression analysis shows usage characteristics of cyber money has the moderating effect on the relationship between cyber money quality and usage intention of cyber money. This paper concludes with some implications for both theory development and cyber money practice.

Cyber Society and Men′s Fashion (사이버 사회와 남성 패션)

  • 이민선
    • The Research Journal of the Costume Culture
    • /
    • v.12 no.5
    • /
    • pp.832-844
    • /
    • 2004
  • The purpose of this study is to explain innovative changes of men's fashion in 'a cyber society', which has come with the advent of internet revolution and where we have witnessed social changes in view of sex, race and class. As for the research methodology, literary research was under taken to study characteristics of cyber society. And demonstrative studies on men's fashion were undertaken through the analysis of photos. 'Cyber space' is defined as 'a communication network of informations and opinions' or 'pseudo world created by computer technology'. Our current world, which has continuous interaction with cyber space, can be understand as cyber society. In a cyber society, transcendental structure is not accepted, feminine characteristics appear more frequently, and western-biased territorial features lose its ground. These characteristics are rooted in ideological characteristics of cyber society, such as opposition and composition. Considering the characteristics of cyber society, the aesthetic images of men's fashion in cyber society can be explained with de-authoritarianism,  metrosexualism and multi-culturalism.

  • PDF

Cyber threats: taxonomy, impact, policies, and way forward

  • Malik, Annas W.;Abid, Adnan;Farooq, Shoaib;Abid, Irfan;Nawaz, Naeem A.;Ishaq, Kashif
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2425-2458
    • /
    • 2022
  • The continuous evolution and proliferation of computer technology and our increasing dependence on computer technology have created a new class of threats: "cyber threats." These threats can be defined as activities that can undermine a society's ability to maintain internal or external order while using information technology. Cyber threats can be mainly divided into two categories, namely cyber-terrorism and cyber-warfare. A variety of malware programs are often used as a primary weapon in these cyber threats. A significant amount of research work has been published covering different aspects of cyber threats, their countermeasures, and the policy-making for cyber laws. This article aims to review the research conducted in various important aspects of cyber threats and provides synthesized information regarding the fundamentals of cyber threats; discusses the countermeasures for such threats; provides relevant details of high-profile cyber-attacks; discusses the developments in global policy-making for cyber laws, and lastly presents promising future directions in this area.

Framework Based Smart City Cyber Security Matrix (프레임워크 기반 스마트시티 사이버 보안 메트릭스)

  • Kim, Sung-Min;Jung, Hae-Sun;Lee, Yong-Woo
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.23 no.2_2
    • /
    • pp.333-341
    • /
    • 2020
  • In this paper, we introduce a smart city-cyber-security-grid-matrix methodology, as a result of research on overall cyber security of smart cities. The identified cyber security risks that threaten smart cities and smart-city-cyber-security-threat list are presented. The smart-city-cyber-security-requirements necessary to secure the smart city cyber security with the developed smart city-cyber-security-grid-matrix are given in this paper. We show how the developed smart city-cyber-security-grid-matrix methodology can be applied to real world. For it, we interlocked the developed smart city-cyber-security-grid-matrix methodology with the cyber-security-framework of the National Institute of Standards and Technology, and developed a framework-based smart city-cyber-security-grid-matrix. Using it, it is easy and comfortable to check the level of cyber security of the target smart ciy at a glace, and the construction and operation of the smart city security system is systematized.

The Trends of Domestic and Overseas Cyber Security Training (국내외 사이버보안 훈련 동향)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.6
    • /
    • pp.857-860
    • /
    • 2021
  • The 21st century society has entered the fourth industrial society of machine to machine from the information society of human to machine. Accordingly, countries around the world are always operating efficient crisis management systems that can quickly respond to disasters or crises. As cyber attacks such as cyber warfare are actually progressing, countries around the world are conducting defense training in response to cyber attacks, and reflecting the results of simulation attacks in improving or building security systems. In this paper, we would like to consider the future cyber training development guide by comparing and analyzing the trends of cyber training in domestic and foreign countries.

Probabilistic safety assessment-based importance analysis of cyber-attacks on nuclear power plants

  • Park, Jong Woo;Lee, Seung Jun
    • Nuclear Engineering and Technology
    • /
    • v.51 no.1
    • /
    • pp.138-145
    • /
    • 2019
  • With the application of digital technology to safety-critical infrastructures, cyber-attacks have emerged as one of the new dangerous threats. In safety-critical infrastructures such as a nuclear power plant (NPP), a cyber-attack could have serious consequences by initiating dangerous events or rendering important safety systems unavailable. Since a cyber-attack is conducted intentionally, numerous possible cases should be considered for developing a cyber security system, such as the attack paths, methods, and potential target systems. Therefore, prior to developing a risk-informed cyber security strategy, the importance of cyber-attacks and significant critical digital assets (CDAs) should be analyzed. In this work, an importance analysis method for cyber-attacks on an NPP was proposed using the probabilistic safety assessment (PSA) method. To develop an importance analysis framework for cyber-attacks, possible cyber-attacks were identified with failure modes, and a PSA model for cyber-attacks was developed. For case studies, the quantitative evaluations of cyber-attack scenarios were performed using the proposed method. By using quantitative importance of cyber-attacks and identifying significant CDAs that must be defended against cyber-attacks, it is possible to develop an efficient and reliable defense strategy against cyber-attacks on NPPs.

The Coming Cyber Society - Types of Multimedia Applications & Services in Japan -

  • Ichinose, Susumu
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 1998.06b
    • /
    • pp.1-3
    • /
    • 1998
  • The 21st century will see the formation of a“Cyber society”that, while separate form the real world, will cooperate with it, leading to the further expansion and development of world society. Cyber society allows the formation of virtual space through the connection of multiple computers in a network. In this virtual space, multiple users can communicate with each other and can collect and exchange information while moving about freely and engaging in activities. Three main technologies are vital to the construction of the Cyber society: platform technology for converting multimedia information to optical signals and performing digital processing and communication processing on such signals; communications network technology for transferring these signals from one point to another; and application technology for configuring the Cyber society that will be formed on this network. This paper describes platform technology and network technology with an emphasis on their relationship to application technology for configuring the Cyber society, and will also discuss InterSpace, one of the cyber society platform system of the Cyber society.

  • PDF

A Study on the Classification of Cyber Dysfunction and the Social Cognition Analysis in the Intelligent Information Society (지능정보사회의 사이버 역기능 분류와 사회적 인식 분석)

  • Lim, Gyoo Gun;Ahn, Jae Ik
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.55-69
    • /
    • 2020
  • The Internet cyber space has become more important as it enters the intelligent information society of the 4th Industrial Revolution beyond the information age through the development of ICT, the expansion of personalized services through mobile and SNS, the development of IoT, big data, and artificial intelligence. The Internet has formed a new paradigm in human civilization, but it has focused only on the efficiency of its functions. Therefore, various side effects such as information divide, cyber terrorism, cyber violence, hacking, and personal information leakage are emerging. In this situation, facing the intelligent information society can lead to an uncontrollable chaos. Therefore, this study classifies the cyber dysfunction of intelligent information society and analyzes social cognition, suggests cyber dysfunction standard of intelligent information society, and examines the seriousness of dysfunction, and suggests technical research directions for future technologies and services. The dysfunctional classification of the intelligent information society was classified into five areas of cyber crime and terrorism, infringement of rights, intelligent information usage culture, intelligent information reliability, and social problems by FGI methodology. Based on the classification, the social perception of current and future cyber dysfunction severity was surveyed and it showed female is more sensitive than male about the dysfunction. A GAP analysis confirmed social awareness that the future society would be more serious about AI and cyber crime

Association Analysis on The Completion Rate of Security education and Cyber Terror Response According to Personal and Job characteristics (인적 및 직무특성과 보안교육 이수율 및 사이버테러 대응과의 연관성 분석)

  • Shin, Hyun Jo;Lee, Kyung Bok;Park, Tae Hyoung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.97-107
    • /
    • 2014
  • The development of ICT has led positive aspects such as popularization of Internet. It, on the other hand, is causing a negative aspect, Cyber Terror. Although the causes for recent and continuous increase of cyber security incidents are various such as lack of technical and institutional security measure, the main cause which threatens the cyber security is the users' lack of awareness and attitude. The purpose of this study is the positive analysis of how the personal and job characteristics influence the cyber security training participation rate and the response ability to cyber terror response training with a sample case of K-corporation employees. In this paper, the relationship among career, gender, department, whether he/she is a cyber security specialist, whether he/she is a regular employee), "ratio of cyber security training courses during recent three years", "ratio that he/she has opened the malicious email in cyber terror response training during recent three years", "response index of virus active-x installation (higher index means poorer response)" is closely examined. Moreover, based on the examination result, the practical and political implications regarding K-corporation's cyber security courses and cyber terror response training are studied.

Research on Cyber IPB Visualization Method based on BGP Archive Data for Cyber Situation Awareness

  • Youn, Jaepil;Oh, Haengrok;Kang, Jiwon;Shin, Dongkyoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.749-766
    • /
    • 2021
  • Cyber powers around the world are conducting cyber information-gathering activities in cyberspace, a global domain within the Internet-based information environment. Accordingly, it is imperative to obtain the latest information through the cyber intelligence preparation of the battlefield (IPB) process to prepare for future cyber operations. Research utilizing the cyber battlefield visualization method for effective cyber IPB and situation awareness aims to minimize uncertainty in the cyber battlefield and enable command control and determination by commanders. This paper designed architecture by classifying cyberspace into a physical, logical network layer and cyber persona layer to visualize the cyber battlefield using BGP archive data, which is comprised of BGP connection information data of routers around the world. To implement the architecture, BGP archive data was analyzed and pre-processed, and cyberspace was implemented in the form of a Di-Graph. Information products that can be obtained through visualization were classified for each layer of the cyberspace, and a visualization method was proposed for performing cyber IPB. Through this, we analyzed actual North Korea's BGP and OSINT data to implement North Korea's cyber battlefield centered on the Internet network in the form of a prototype. In the future, we will implement a prototype architecture based on Elastic Stack.