• 제목/요약/키워드: cyber society

Search Result 2,497, Processing Time 0.026 seconds

Research on Cyber-terrorism preparation scheme (사이버테러 대응방안에 관한 연구)

  • Kim, Yeon Jun;Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.33-42
    • /
    • 2016
  • While evolving information-oriented society provides a lot of benefits to the human life, new types of threats have been increasing. Particularly, cyber terrorism, happen on the network that is composed of a computer system and information communication network, and the mean and scale of damage has reached a serious level. In other words, it is hard to locate cyber terror since it occurs in the virtual space, not in the real world, so identifying "Who is attacking?" (Non-visibility, non-formulas), or "Where the attack takes place?" (trans-nation) are hard. Hackers, individuals or even a small group of people, who carried out the cyber terror are posing new threats that could intimidate national security and the pace and magnitude of threats keep evolving. Scale and capability of North Korea's cyber terrorism are assessed as world-class level. Recently, North Korea is focusing on strengthen their cyber terrorism force. So improving a response system for cyber terror is a key necessity as North Korea's has emerged as a direct threat to South Korean security. Therefore, Korea has to redeem both legal and institutional systems immediately to perform as a unified control tower for preemptive response to cyber terrors arise from North Korea and neighboring countries.

Development and Validation of Teaching-Learning Model for Cyber Education of Giftedness (사이버영재교육을 위한 교수-학습 모형의 개발 및 검증)

  • Lee, Jae-Ho;Hong, Chang-Euy
    • Journal of Gifted/Talented Education
    • /
    • v.19 no.1
    • /
    • pp.119-140
    • /
    • 2009
  • This paper examined its possibility and made its new definition by finding relevant bases in order to make a close inquiry into its Identity and direction at this point when cyber-based gifted education academy is established and operated again by its necessity And 4 models which can be used in special education for the gifted were developed making a link with special education for the gifted by collecting and re-classifying cyber educational methods developed by basic research as priority of the educational method which is considered to be the most urgent issue in practical cyber learning. It is a project-type cooperation education model, an information collection-type research education model, a community-type discussion education model, and a problem focus-type e-PBL education model. To apply developed leaching-learning models to reality, students at gifted education academy in Gyeonggi Cyber Gifted Province were imputed models in different ways respectively for 4 months. As a result of analysis and statistical data of activity level and satisfaction level of students who participated in learning activity, it appeared that high level of satisfaction and active activity level were induced compared to the previous method based on tasks. It is expected that this paper will provide the bases when each cyber-based gifted education academy plans operation plan later on, and it will provide proper methods when cyber guidance teachers plan class activities.

A Study on Relationship between Media Environment and Adolescent Cyber-Delinquency : Focused on X-rated Media Commitment (매체환경과 청소년 사이버비행과의 관계에 대한 연구 : 성인매체몰입을 중심으로)

  • Lee, Chang-Moon;Moon, Jin-Young;Park, Ju-Won
    • Journal of Digital Convergence
    • /
    • v.17 no.4
    • /
    • pp.365-379
    • /
    • 2019
  • The purpose of this study is to investigate what factors affect cyber-delinquency after examining the previous research focusing on the general strain theory and the delinquency opportunity theory in the existing studies. And as adolescents move from middle school to high school, this study is intended to analyze what factors affect cyber-delinquency from a longitudinal perspective using KCYPS(Korea Child and Youth Panel Survey) elementary 4th grade fourth and seventh data. The adolescence cyber-delinquency probability of occurrence were analyzed through the panel logit fixed-effect model using STATA. And then the cyber-delinquency frequency of adolescents were analyzed through the panel tobit random-effect model. As a result of analyzing the factors affecting cyber-delinquency frequency, Adult media commitment, computer use time, and cell phone dependency increased cyber-delinquency frequency. On the other hand, among the parenting attitudes, the attitude of supervising attentively and adolescents' age-increasing decreased cyber-delinquency frequency.

Suggestions for E-Learning Based on Four Years of Cyber University Experience

  • LEE, Okhwa
    • Educational Technology International
    • /
    • v.6 no.1
    • /
    • pp.41-63
    • /
    • 2005
  • E-Learning is widely introduced with cyber universities in Korea from 2001 whencyber universities were first authorized by the Ministry of Education and Human Resource Development. E-learning amplified by cyber university gave a big impact in the campus based university which became the cause for the educational paradigm shift. The changes of status of cyber university shows important trend in college education which was analyzed by enrollment rate, types of cyber university, demography, and study areas. The enrollment rate of cyber universities is ever since 2001 and variety of study areas gives popularity to students. The demography of students is as expected older than traditional students. Female students at the cyber university outnumbered that at campus based university in Korea. For analyzing the trend of e-learning in Korea, there were studies twice in 2001 May-June from 213 faculty members and staff, 630 students and in 2004 May-June with 401 students. Most of e-learning students tent to spend less time yet, students feel more burden with e-learning. Professors tend to load more materials for the e-learning in 2001but in 2004 study, the difference no longer exists. Professors and students feel the academic achievement through e-learning is not as good as from the traditional classes. Difficulties for e-learning in 2001 were the lack of administrative information but in 2004, boring contents and lack of instructional strategies for e-learning. Technical problems still do exist but less serious. Suggestions for e-learning are blended learning, online students prefer video streaming with their own lecturer, new definition of instructor is needed, professional development for content development and online instruction is needed, success story of online learning should be encouraged, guidance for online students needed. The cyber university experiencegave a positive impact on the traditional universities such as rethinking the roles of universities, the quality control of classes, professional development, student oriented educational service of e-learning pedagogy.

A Study of Reinforcement Learning-based Cyber Attack Prediction using Network Attack Simulator (NASim) (네트워크 공격 시뮬레이터를 이용한 강화학습 기반 사이버 공격 예측 연구)

  • Bum-Sok Kim;Jung-Hyun Kim;Min-Suk Kim
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.3
    • /
    • pp.112-118
    • /
    • 2023
  • As technology advances, the need for enhanced preparedness against cyber-attacks becomes an increasingly critical problem. Therefore, it is imperative to consider various circumstances and to prepare for cyber-attack strategic technology. This paper proposes a method to solve network security problems by applying reinforcement learning to cyber-security. In general, traditional static cyber-security methods have difficulty effectively responding to modern dynamic attack patterns. To address this, we implement cyber-attack scenarios such as 'Tiny Alpha' and 'Small Alpha' and evaluate the performance of various reinforcement learning methods using Network Attack Simulator, which is a cyber-attack simulation environment based on the gymnasium (formerly Open AI gym) interface. In addition, we experimented with different RL algorithms such as value-based methods (Q-Learning, Deep-Q-Network, and Double Deep-Q-Network) and policy-based methods (Actor-Critic). As a result, we observed that value-based methods with discrete action spaces consistently outperformed policy-based methods with continuous action spaces, demonstrating a performance difference ranging from a minimum of 20.9% to a maximum of 53.2%. This result shows that the scheme not only suggests opportunities for enhancing cybersecurity strategies, but also indicates potential applications in cyber-security education and system validation across a large number of domains such as military, government, and corporate sectors.

  • PDF

A Study on the Countermeasure to Deal with Cyber Terrorism (사이버테러리즘의 대응방안에 관한 연구)

  • Oh Tae-Kon
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.3
    • /
    • pp.93-101
    • /
    • 2005
  • These days, modern society is facing a 'turning point of paradigm' from industrial society to knowledge and information society. It indicates an entry to the high-speed network society centering on knowledge. Specifically, Korea has invested enormously to If Industry and finally other advanced countries are eager to export technologies of our country through benchmarking. However, because of our growth-oriented policy, Korea is not very good at dealing with the dysfunctions of information-centered society, and one of the representative problems is cyber-terrorism. Cyber terrorism which anonymous actors do to the uncertain number of people is one of the new types of terrorism. This study aims at political and legal speculations on cyber terrorism for protection of contents and find its countermeasures.

  • PDF

Development of Cyber Lecture Contents and Application to the Basic Neuroscience Integrative Lecture for Medical Students (기초의학 통합강의 운영을 위한 가상강의(Cyber Lecture)의 개발 및 적용 -기초신경과학 통합강의의 운용과 설문을 통한 학생들의 의견을 중심으로-)

  • Park, Jeong-Hyun;Park, Kyeong-Han;Lee, Young-Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.5
    • /
    • pp.2222-2229
    • /
    • 2011
  • The purpose of this study was to evaluate the efficacy of basic integrative lecture course of medical college through cyber lecture. This study was also aimed to develop and implement a progressive cyber-teaching method which integrative lecture system is concerned for medical students. In this study, effectiveness of cyber lecture on the student's satisfaction, content difficulty and course management were analyzed by way of anonymous survey at the end of basic neuroscience integrative lecture course. Survey data were also analyzed with statistical tools to find out strength of correlation between students degree of satisfaction to cyber lecture and their individual grade of this course. The majority of students held positive opinions on course management, level of difficulty in each session, utilizing multimedia contents and preferred cyber lecture system to be continued in the future. Many students also suggested intimate integration of multimedia contents shown in cyber lecture to the lab sessions for the maximization of educational effect. In this study, it suggested that cyber lecture could be a useful tool in teaching integrative medical subjects and play more important role in the future integrative medical subjects with the improvement of present problems and limitations.

National Culture And Its Impacts On Cyber Diplomacy

  • Shin, Min-Soo;Khurshid, Sharipov
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.415-420
    • /
    • 2007
  • Diffusion of information and communication technologies is a global phenomenon. In spite of rapid globalization there are considerable differences between nations in terms of the adoption and usage of new technologies. Several studies exploring causal factors including national cultures of information and communication technology adoption have been carried out. The focus of this paper is slightly different from other studies in this area. Rather than concentrating on the individual information technology the cyber diplomacy is the focus. This research conducted an analysis of the impact national culture has on adoption of the cyber diplomacy and its components for 95 countries. The national cultural dimensions were identified using Hofstede's model of cultural differences. The research model and hypotheses were formed and tested using correlation and regression analysis. The findings indicate that worldwide cyber diplomacy adoption is related to national culture. The result has theoretical and practical implications.

  • PDF

Two Phase Heuristic for Test Set Generation Using Simulated Annealing in Cyber Testbank System (사이버 문제은행에서 시뮬레이티드 어닐링을 이용한 2단계 문제세트 생성 휴리스틱)

  • 황인수
    • Korean Management Science Review
    • /
    • v.18 no.1
    • /
    • pp.155-164
    • /
    • 2001
  • The widespread diffusion of Internet has enables every college and education institute to develope cyber education systems to meet the multiple needs of students, but it is not true that the effectiveness of cyber education is fruitful in terms of evaluation systems. Most of the early developed web-based evaluation systems for cyber education require that all the students should solve uniformed test set which are included in the predetermined static HTML pages. Therefore, it is impossible to dynamically provide a test set with consistency and reliability. This paper purpose to describe the employment of simulated annealing in cyber testbank system for test set generation that satisfy all constraints. The constraints include number of items for each skill, method, domain, topic, and so on. This research developed two phase heuristic combining sequential test set generation algorithm with simulated annealing. As a result of computer simulations, it was found that the two phase heuristic outperforms the other algorithms.

  • PDF

Factors Affecting Outsourcing Decisions in the Implementation of Small and Medium Sized Cyber Shopping Shops (중소 사이버쇼핑숍 구현에서의 아웃소싱 결정요인에 관한 실증적 연구)

  • Chung, Young-Soo
    • Asia pacific journal of information systems
    • /
    • v.12 no.2
    • /
    • pp.25-44
    • /
    • 2002
  • The internet-based electronic commerce is considered as a new strategic alternative to boost competitiveness for small and medium-sized enterprises(SMEs). However, very little research about them has been reported. Meanwhile, the cyber shopping shops in Korea are growing rapidly in their numbers, scales, and diversity of business models. The primary purpose of this study is to investigate the factors influencing outsourcing decisions in the implementation of small and medium-sized cyber shopping shops. Based on the previous studies on IS outsourcing, marketing channel, and their related theories, three areas of determinants(IT & organizational, product, marketing channel characteristics) were identified. Responses of 125 cyber shopping shops from e-mail survey indicate that IT capability, technical specificity of shop implementation, degree of product customization, average amount of order, marketing capability are negatively associated with outsourcing of cyber shopping shop implementation. The results also indicate that the outsourcing decision on systems implementation and marketing channel selection(direct/indirect selling) is performed separately.