• Title/Summary/Keyword: cyber society

Search Result 2,480, Processing Time 0.032 seconds

Design and Implementation of A Cyber-school System Based on Web Groupware (웹 그룹웨어 기반의 가상학교 시스템의 설계 및 구현)

  • 고일석;나윤지
    • The Journal of Information Technology and Database
    • /
    • v.8 no.1
    • /
    • pp.13-24
    • /
    • 2001
  • This paper presents a design and implementation of cyber-school system using object modeling technique and web groupware. The system design method based on object modeling techniques reduce cyber-school construction effort and cost with reusing of modules. The system is a kind of web group application based on WWW that allow members who located on remote computer to do cooperative learning and to communicate with other students and teachers independent of time and location. In this system we use Linux operating system for efficient development on real education field. and we can reduce cyber-school development effort arid cost With this system.

  • PDF

Designing a Personalized Portal Model based on Enterprise 2.0 (Enterpise 2.0 기반의 업무 맞춤 포털 모델 설계)

  • Song, Sang-Sup;Kim, Sun-Mi;Kim, Sun-Ho;Kang, Yoon-Soo
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2008.05a
    • /
    • pp.364-367
    • /
    • 2008
  • Cyber office is a personalized enterprise portal model for knowledge workers. The key services of cyber office are both personalization and emergent collaboration. Personalization service is provided by choosing service from service repository and then dropping it in the cyber office. Service repository contains various kinds of services supporting business activities. Cyber office provides blog service and profile service for knowledge workers to participate in knowledge based collaboration voluntarily.

  • PDF

The Development of Cyber-Education in China: A Review of Experiences and Lessons

  • ZHU, Zhiting;WANG, Wei;LUO, Hongwei
    • Educational Technology International
    • /
    • v.6 no.2
    • /
    • pp.1-9
    • /
    • 2005
  • Starting with analyzing the development of cyber-education in China, this article discusses experiences and lessons acquired through making reflections on the following aspects: technology vs. pedagogy, the degree education vs. non-degree education, resource exclusivism vs. resource inclusivism, mono-service system vs. multi-service system, and educational quality vs. economic profit. Finally, the paper puts forward some suggestions on the future development of cyber-education in China.

A Study on Effective Response of Police Officer against Cybercrime (경찰의 사이버범죄에 대한 효율적 대응방안에 관한 연구)

  • Park, Chang-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.189-196
    • /
    • 2008
  • In this modern society, a main tendency of crime is to increase in the incidence frequency of cyber crime. Varied criminal techniques from simple crimes to highly specialized crimes appear through cyber space. With the expansion of Internet spread, ordinary people increasingly have an opportunity to have access to information media and their possibilities to be involuntary associated with crimes get higher. In this sense, its seriousness is great. This study examined the present state of cyber crimes that appear through their several types and characteristics and the problems of police response to cyber crimes, and suggest effective response of police officer.

  • PDF

The Research Related to Kansei Stimulation Elements in Cyber-Space

  • Dong, Oh-Gi
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2001.05a
    • /
    • pp.68-73
    • /
    • 2001
  • The word "cyber-space" was coined through the developments in communication technology and computers. It became possible to experience disembodied space in practice through a new kind of medium. this research aims to clarify the kansei stimulation elements as realistic sensed by users who use 3-dimensional expressions in cyber-space. The research was carried out by preparing 25 samples of computer graphics, and administering 3 questionnaires to 12 examinees. The Principal Ingredient Analysis method was used for its analysis and assessment. As a result of this research, it can be concluded that materials, reflection and shadow have the strongest effect on human beings' senses in cyber-space.

  • PDF

Production of Contents Embodiment for Cyber Underwater Using Environment Fish Schooling Behavior Simulator

  • Kim, Jong-Chan;Cho, Seung-Il;Kim, Chee-Yong;Kim, Eung-Kon
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.6
    • /
    • pp.770-778
    • /
    • 2007
  • Fish schooling or group moving in cyber underwater is a part of beautiful and familiar ecosystem. It is not so easy to present the behavior of fish crowd naturally as a computer animation. Thanks to development of computer graphics in entertainment industry, the numbers of digital films and animations is increased and the scenes of numerous crowd are shown to us. Though there are many studies on the techniques to process the behavior of crowd effectively and the developments of crowd behavioral systems, there is not enough study on the development for an efficient crowd behavioral simulator. In this' paper, we smartly present the types offish behavior in cyber underwater and make up for the weak points of time and cost. We develop the fish schooling behavior simulator for the contents of cyber underwater, automating fish behavioral types realistically and efficiently.

  • PDF

Design and Implementation of Cyber Food Self Diagnosis Program for Health Care (Cyber-FSDP) (사이버 식생활 자가진단 시스템 (cyber-FSDP)의 설계 및 구현)

  • 이정수;이수진;김교정
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2000.04a
    • /
    • pp.435-442
    • /
    • 2000
  • 만성질병, 식습관, 영양등 스트레스에 시달리는 현대인의 건강 상태를 파악하는 일은 매우 중요하며 또한 필요하다. 그러나 식이 섭취 평가는 많은 분야의 자료와 지식을 필요로 하기 때문에 손쉽게 일반인이 신뢰성 있는 평가는 얻기는 쉽지 않다. 본 연구는 식품, 영양, 조리, 만성질병, 식습관 등의 여러 전문 분야의 자료와 지식을 기반으로 한 웹 상에서의 영양 평가 시스템으로 '건강 관리를 위한 사이버 식생활 자가 진단 시스템(Cyber Food Self Diagnosis Program, 이하 Cyber-FSDP)'의 설계 및 구축에 관한 것이다. 바탕으로 한다. 초고속 통신망을 이용하여 사람들의 건강문제와 관련된 식생활 정보를 수집하고, 개인별 식생활을 사용자와 상호작용하게 온라인으로 평가·진단하여 이를 개선하고 궁극적으로는 만성질병 위험도를 감소시키고 건강을 증진시킬 수 있는 영양 및 만성 질병 평가 전문가 시스템을 구축한 사례에 대한 Web 응용 프로그램 개발을 소개하며, 개발환경으로는 서버를 엔터프라이즈 3000 Solaris 2.5.1을 사용했으며, DBMS는 IUS (Illustra Universal Server)를 사용하였고, APB(App Page Builder), JabaScript, HTML 등의 언어로 구현되었다.

  • PDF

Business Process Reengineering of an Information Exchange Management System for a Nationwide Cyber Threat Intelligence

  • Pramadi, Yogha Restu;Rosmansyah, Yousep;Kim, Myonghee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.2
    • /
    • pp.279-288
    • /
    • 2017
  • Nowadays, nations cyber security capabilities play an important role in a nation's defense. Security-critical infrastructures such as national defenses, public services, and financial services are now exposed to Advanced Persistent Threats (APT) and their resistance to such attacks effects the nations stability. Currently Cyber Threat Intelligence (CTI) is widely used by organizations to mitigate and deter APT for its ability to proactively protect their assets by using evidence-based knowledge. The evidence-based knowledge information can be exchanged among organizations and used by the receiving party to strengthen their cyber security management. This paper will discuss on the business process reengineering of the CTI information exchange management for a nationwide scaled control and governance by the government to better protect their national information security assets.

Cyber Attack and Defense Modeling Using Vulnerability Metrics (취약성 매트릭스를 이용한 사이버 공격 및 방어 모델링)

  • Lee Jang-Se;Chi Sung-Do;Choi Gyoo-Seok
    • Journal of the Korea Society for Simulation
    • /
    • v.13 no.3
    • /
    • pp.11-20
    • /
    • 2004
  • The major objective of this paper is to perform modeling of cyber attack and defense using vulnerability metrics. To do this, we have attempted command level modeling for realizing an approach of functional level proposed by Nong Ye, and we have defined vulnerability metrics that are able to apply to DEVS(Discrete Event System Specification) and performed modeling of cyber attack and defense using this. Our approach is to show the difference from others in that (i) it is able to analyze behaviors of systems being emerged by interaction between functional elements of network components, (ii) it is able to analyze vulnerability in quantitative manner, and (iii) it is able to establish defense suitably by using the analyzed vulnerability. We examine an example of vulnerability analysis on the cyber attack and defense through case study.

  • PDF

A Target Search Mobile Robot Based on Subsumption Architeture (포섭구조를 이용한 목표점 탐색 이동로봇)

  • Jeong, Baek-Jun;Ha, Jung-Han;Park, Jun-Kyu;Hwang, In-Woong;Won, Il-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.727-730
    • /
    • 2017
  • 복잡한 알고리즘과 고가의 센서 없이도 동적 환경에서 목표를 탐색하는 이동 로봇 시스템을 제안하였다. 탐색환경의 지도를 제작하지 않고 단순한 목표를 가진 하부 모듈의 결합만을 사용하는 포섭구조를 활용하였다. 제안한 시스템의 유용성 검증을 위해 실험을 하였고, 그 결과 목표를 찾아 감을 확인할 수 있었다.