• Title/Summary/Keyword: cyber society

Search Result 2,488, Processing Time 0.028 seconds

A Study on the Factors Influencing the Learning Satisfaction of Records Management Cyber Education (기록물 사이버교육의 학습만족도 향상을 위한 영향 요인 연구)

  • Na, Kyeongwon;Chang, Wookwon
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.22 no.1
    • /
    • pp.61-82
    • /
    • 2022
  • This study aims to investigate the factors influencing the learning satisfaction of records management cyber education that is opened and operated by the National Archives of Korea, as well as to improve the quality of cyber education program. Cyber education consisted of an introductory course, an intensive course, and a liberal arts course. As the major factors for learning satisfaction, "validity of content structure, interaction between professors and learners, learning motivation, active learning attitude, ease of use environment, and level of organizational support" were set. An online survey was conducted on the learning satisfaction according to the curriculum of each course. The survey was conducted to 107 institutions with specialized records management personnel, and additional in-depth interviews were also conducted. The survey analysis consisted of factor analysis, independent sample T-test, analysis of variance (ANOVA), correlation analysis, and multiple regression analysis. As a result of the study, the factors influencing learning satisfaction were found in the order of interaction between professors and learners, learning motivation, and validity of content structure.

NCS based Leveled Micro-Degree Certification Model for Training Practical Cyber Security Experts

  • Kim, Jeong-Sham;Lee, Kyu-Chang;Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.8
    • /
    • pp.123-133
    • /
    • 2022
  • In this paper, we propose a Leveled Micro-Degree Job Competency Certification Model that considers the level of the job based on the job defined in the NCS. There is a mismatch of manpower due to the problem of university education that cannot keep up with the rapidly changing technological environment caused by the 4th Industrial Revolution. The Nano-Degree and Micro-Degree systems designed to solve this problem are used for job competency certification of cyber security personnel. NCS sub-categorized job field is defined as Micro-Degree and detailed job by ability unit is defined as Nano-Degree, the level of the ability unit defined by level is equally applied to the Micro-Degree. And it is a system that certifies the job competency corresponding to the degree-based university academic background. By applying this system to the curriculum of Cyber Security School, Yeungnam University College, we proposed a method to configure the Nano-Degree course based on NCS duties. The method proposed in this paper can be used as a method for verifying job competency of Nano-Degree and Micro-Degree, which are recently introduced by many universities.

Trend Analysis of the Factors of Cyber Crime Offences Among Adolescents (시간의 흐름에 따른 청소년 사이버범죄 가해경험 영향요인의 변화에 대한 연구)

  • Shin, Ji-hui;Hong, Myeong-gi;Hwang, Eui-gab
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.87-95
    • /
    • 2022
  • Cyber society formed by the development of the Internet is growing rapidly. The Internet is very convenient for our daily life, but it comes with negative aspects including cybercrime and cyberbullying. Recently, there have been incidents that show cyber criminal techniques of adolescents are getting more sophisticated and ferocious. To cope with this crime problem, it is necessary to analyze the causes that affect cyber crime offences among adolescents. There are numerous studies on cybercrime, but less attention has been given to trend analysis. To fill this void, this study examined how the factors that affected the cyber crime offences among adolescents have been changed over time according to transitions in social structure. Implications for future research and policies for adolescents' cyber crime prevention such as time considered response strategies are discussed based on the findings.

A Study on the Influencing factors of Cyber Universities' Performance in China (중국 사이버대학의 서비스 특성화가 성과에 미치는 영향에 관한 연구)

  • Zhang, Wei keon;Kwon, Sun Dong
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.11 no.4
    • /
    • pp.91-101
    • /
    • 2016
  • This research focused on searching the specialized factors which affect the cyber universities' performance. This research was approached from three perspective of professor, graduation and employment, and brand image to embody the cyber universities' performance. We drew five factors of contents variety, contents quality, practical orientation of contents, lecture presence, and learning management as the Influencing factors of cyber universities' performance. We proved our research model by analyzing 170 questionnaires which were completed by college students who were studying at cyber universities in China. The results of analysis are showed as below: 1) The level of contents variety can affect the cyber universities' performance; higher level gains better outcomes. 2) The level of contents quality can affect the cyber universities' performance; better quality gains better outcomes. 3) The level of practical orientation of contents can affect the cyber universities' performance; the higher the better. 4) The level of lecture presence can affect the cyber universities' performance; the stronger the better. 5) The level of learning management can affect the cyber universities' performance; the higher the better.

  • PDF

Implementation of payment settlement system through Cyber Bank for Electronic Commerce (전자상거래용 사이버뱅크의 지불결제시스템 구축)

  • Kim, Moon-Shik;Lee, Eun-Seok
    • The KIPS Transactions:PartD
    • /
    • v.15D no.1
    • /
    • pp.121-130
    • /
    • 2008
  • In line with the enhanced weight and variety of electronic commerce in business activities, new type of payment settlement and banking system which will enable to store, create and transfer values from the existing method of payment settlement is highly required. Cyber Banking system draws strong attention being the solution of there requirements. The existing Cyber Banking system has the difficulty of operation, administration, in addition to the problem of initial facility investment of big amount, resulted from the usage of the current business process. As the existing Cyber Bank system is unable to carry out the function of storing, creating, and transferring values due to the adoption conventional credit card system instead of the application of non-stop payment system between the seller and buyer. As a result, current Cyber Bank system still imply the deficiency of non-performing cash payment function on internet. This paper describes (1) an integrated application process, One Process One Input (OPOI) which is essential for software development of the Cyber Bank, (2) an application process of payment settlement system to be applied to the electronic commerce in Internet. And then, with these for a basis, (3) design and implementation of payment settlement system through CyberBank for Electronic Commerce. Consequently, by means of this suggested process, we could attempt to solve the problem of existing Cyber Bank system and further to explore the possibility of advanced Cyber Banking being the non-stop payment settlement system. The effectiveness of this suggested system has been practically confirmed.

An Integrated Test of Interaction Effect between Causes and Internet Ethics of Smart Phone Cyber Bullying (스마트폰 이용에서 사이버폭력의 그 원인들 및 인터넷윤리의 통제효과에 대한 통합적 검증 연구)

  • Jang, Ha-Young;Lee, Seong-Sik
    • Informatization Policy
    • /
    • v.26 no.2
    • /
    • pp.46-61
    • /
    • 2019
  • This study constructs an integrated model for university students' smart phone cyber bullying and tests interaction effects between causal and control factors. Causal factors include low self-control, differential association with cyber bullying peers, and victimization experiences; and control factors include internet ethics, perceived certainty of formal punishment, and bond to parents. This study focuses on examining how internet ethics buffers the effect of causal factors in cyber bullying. Results show that both differential association with cyber bullying peers and victimization experiences have significant effects on cyber bullying. And among the control factors, internet ethics only has a negative direct effect on cyber bullying. In addition, it is found that there are significant interaction effects between two causal factors - differential association with cyber bullying peers and victimization experiences - and internet ethics. It is also shown that there is a significant interaction effect between victimization experience and bond to parents, but a perceived formal punishment has no significant control effect. It is revealed that internet ethics is a main control factor in buffering the effects of causal factors in cyber bullying.

A study on the cyber common operation picture for situational awareness in cyberspace (사이버공간 내 상황인식을 위한 사이버 공통 작전 상황도 연구)

  • Kim, Kook-jin;Youn, Jae-pil;Yoon, Suk-joon;Kang, Ji-won;Kim, Kyung-shin;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.87-101
    • /
    • 2022
  • Cyber-attacks occur in the blink of an eye in cyberspace, and the damage is increasing all over the world. Therefore, it is necessary to develop a cyber common operational picture that can grasp the various assets belonging to the 3rd layer of cyberspace from various perspectives. By applying the method for grasping battlefield information used by the military, it is possible to achieve optimal cyberspace situational awareness. Therefore, in this study, the visualization screens necessary for the cyber common operational picture are identified and the criteria (response speed, user interface, object symbol, object size) are investigated. After that, the framework is designed by applying the identified and investigated items, and the visualization screens are implemented accordingly. Finally, among the criteria investigated by the visualization screen, an experiment is conducted on the response speed that cannot be recognized by a photograph. As a result, all the implemented visualization screens met the standard for response speed. Such research helps commanders and security officers to build a cyber common operational picture to prepare for cyber-attacks.

Cyber attack group classification based on MITRE ATT&CK model (MITRE ATT&CK 모델을 이용한 사이버 공격 그룹 분류)

  • Choi, Chang-hee;Shin, Chan-ho;Shin, Sung-uk
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.1-13
    • /
    • 2022
  • As the information and communication environment develops, the environment of military facilities is also development remarkably. In proportion to this, cyber threats are also increasing, and in particular, APT attacks, which are difficult to prevent with existing signature-based cyber defense systems, are frequently targeting military and national infrastructure. It is important to identify attack groups for appropriate response, but it is very difficult to identify them due to the nature of cyber attacks conducted in secret using methods such as anti-forensics. In the past, after an attack was detected, a security expert had to perform high-level analysis for a long time based on the large amount of evidence collected to get a clue about the attack group. To solve this problem, in this paper, we proposed an automation technique that can classify an attack group within a short time after detection. In case of APT attacks, compared to general cyber attacks, the number of attacks is small, there is not much known data, and it is designed to bypass signature-based cyber defense techniques. As an attack model, we used MITRE ATT&CK® which modeled many parts of cyber attacks. We design an impact score considering the versatility of the attack techniques and proposed a group similarity score based on this. Experimental results show that the proposed method classified the attack group with a 72.62% probability based on Top-5 accuracy.

A study on the developing and implementation of the Cyber University (가상대학 구현에 관한 연구)

  • Choi, Sung;Yoo, Gab-Sang
    • Proceedings of the Technology Innovation Conference
    • /
    • 1998.06a
    • /
    • pp.116-127
    • /
    • 1998
  • The Necessity of Cyber University. Within the rapidly changing environment of global economics, the environment of higher education in the universities, also, has been, encountering various changes. Popularization on higher education related to 1lifetime education system, putting emphasis on the productivity of education services and the acquisition of competitiveness through the market of open education, the breakdown of the ivory tower and the Multiversitization of universities, importance of obtaining information in the universities, and cooperation between domestic and oversea universities, industry and educational system must be acquired. Therefore, in order to adequately cope wi th these kinds of rapid changes in the education environment, operating Cyber University by utilizing various information technologies and its fixations such as Internet, E-mail, CD-ROMs, Interact ive Video Networks (Video Conferencing, Video on Demand), TV, Cable etc., which has no time or location limitation, is needed. Using informal ion and telecommunication technologies, especially the Internet is expected to Or ing about many changes in the social, economics and educational area. Among the many changes scholars have predicted, the development and fixations of Distant Learning or Cyber University was the most dominant factor. In the case of U. S. A., Cyber University has already been established and in under operation by the Federate Governments of 13 states. Any other universities (around 500 universities has been opened until1 now), with the help of the government and private citizens have been able to partly operate the Cyber University and is planning on enlarging step-by-step in the future. It could be seen not only as U. S. A. trying to elevate its higher education through their leading information technologies, but also could be seen as their objective in putting efforts on subordinating the culture of the education worldwide. UTRA University in U. S. A., for example, is already exporting its class lectures to China, and Indonesia regions. Influenced by the Cyber University current in the U.S., the Universities in Korea is willing .to arrange various forms of Cyber Universities. In line with this, at JUNAM National University, internet based Cyber University, which has set about its work on July of 1997, is in the state of operating about 100 Cyber Universities. Also, in the case of Hanam University, the Distant Learning classes are at its final stage of being established; this is a link in the rapid speed project of setting an example by the Korean Government. In addition, the department of education has selected 5 universities, including Seoul Cyber Design University for experimentation and is in the stage of strategic operation. Over 100 universities in Korea are speeding up its preparation for operating Cyber University. This form of Distant Learning goes beyond the walls of universities and is in the trend of being diffused in business areas or in various training programs of financial organizations and more. Here, in the hope that this material would some what be of help to other Universities which are preparing for Cyber University, I would 1ike to introduce some general concepts of the components forming Cyber University and Open Education System which has been established by JUNAM University. System of Cyber University could be seen as a general solution offered by tile computer technologies for the management on the students, Lectures On Demand, real hour based and satellite classes, media product ion lab for the production of the multimedia Contents, electronic library, the Groupware enabling exchange of information between students and professors. Arranging general concepts of components in the aspect of Cyber University and Open Education, it would be expressed in the form of the establishment of Cyber University and the service of Open Education as can be seen in the diagram below.

  • PDF

Intelligent Search System Providing The Various Conditional Product Search (다조건 상품 검색을 지원하는 지능형 검색 시스템)

  • 서양진;한상용
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.3
    • /
    • pp.179-196
    • /
    • 1999
  • A cyber shopping mall is a place where consumers acquire the product information and make purchase decision in the cyber space. Even though there are many advantages over traditional malls, there are still several limitations to do shopping in an existing cyber mall. One of them is the absence of efficient search tool to handle various products specifications. Existing search systems usually support the "keyword search only" with limited product information. Consumers spend lots of their time and efforts in searching products and comparing them. Recently, some web sites provide the shopping mall comparison service that supports the additional search conditions such as price and maker. These services improve the situation but it is not still acceptable. In this paper, we propose an intelligent product search system based on a mediator which supports various conditional search for each product. Our system provides consumers with search results that satisfy purchase specifications. Our system is implemented in Visual basic and pert and experimental results show satisfactory performance.

  • PDF