• Title/Summary/Keyword: cyber society

Search Result 2,460, Processing Time 0.025 seconds

Countermeasure by Cyber Infringement Accident Present Condition Analysis of Public and Private Section (공공 및 민간부문의 사이버침해사고 현황분석에 따른 대응방안)

  • Cho, Ho-Dae;Shin, Dong-Il
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.331-338
    • /
    • 2009
  • We live was operates the life which is the Internet and became infra is very important. In order minimizes like this disfunction from will be applied the new order must take a position in cyber space. The cyber infringement most the information society brings about is serious concern middle one. The biggest thing is anonymous characteristic with cause of cyber crime. Also well cannot know becomes the cause where commits a crime that about cyber crime. Cyber crime the guilty conscience is thin. And the criminal who commits a cyber crime sense of insecurity is few. This paper which sees cyber infringement accident dividing came in public section, and analyzed presented a present condition and a confrontation plan.

Emotional Audio Design in Cyber Space (사이버 공간 상에서의 감성 오디오 디자인)

  • 박정순
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2000.04a
    • /
    • pp.244-247
    • /
    • 2000
  • 웹은 정보화시태의 새로운 커뮤니케이션 매체로서 실제세계(real world)를 그대로 옮겨 놓은 가상세계(virtual world, cyber space)라 할 수 있으며 또 다른 한의 생활공간이기도 하다. 이런 가상공간 안에서 사용되는 가상제품(cyber product)들은 실제세계에서의 물리적인 제품과는 달리 형태의 파괴, 무제한적인 색상과 재질감, 유니크한 작동메카니즘과 인터렉티브한 요소에 의해 기계가 아닌 하나의 생명체로서 감성을 지닌 제품 디자인이 가능하다. 이에 본 연구에서는 이런 특성에 따라 실제세계의 오디오에서 느낄 수 없는 새로운 즐거움을 주는 사이버공간상에서의 시청각오디오를 디자인하였다.

  • PDF

Development of Multimedia Education-Network Construction Solution Based on Intranet (인트라넷을 활용한 멀티미디어 학내망 구축 솔류션의 개발)

  • 고일석
    • Journal of the Korea Society for Simulation
    • /
    • v.9 no.4
    • /
    • pp.59-66
    • /
    • 2000
  • Computer has been many effect in diverse field of mankind and it brings development of educational field like CAI. Also development of internet and If bring rapid growth of cyber school and it is required multimedia environment and efficient cyber school construction package for efficient management. In this paper we develop multimedia education-network construction package for cyber school using intranet. It will reduce the cost of management and construction for small and medium size cyber school, and it will raise efficiency of cyber school.

  • PDF

Analysis of Cyber Crime and Its Characteristics (사이버범죄 유형별 특징 분석 연구)

  • So-Hyun Lee;Ilwoong Kang;Yoonhyuk Jung;Hee-Woong Kim
    • Information Systems Review
    • /
    • v.21 no.3
    • /
    • pp.1-26
    • /
    • 2019
  • Now we are facing with a possibility of having crimes, which have been only possible offline, in cyber spaces as well.Especially, a recent growth in the use of SNS, promoted by popularization of smart phones, also has led an abrupt increase in cyber crime. It would be important to have a understanding of cyber crime and its characteristics by type as well as factors associated with each type of cyber crime in order to devise appropriate preventive measures against cyber crime. However, most of the previous studies on cyber crimesolely made through literature review or indirect approaches. Therefore, this study has been designed to conduct the interview with actual suspects(criminals) of cyber crime to address factors of cyber crime and to devise specific preventive measures and countermeasures against cyber crime. Especially, among various types of cyber crime, this study aims at addressing the 'trades' and 'financial transaction' of crimes committed using the information and communication network and the 'cyber libel/insult'of crimes committed using unlicensed contents, which have been soared recently and become significant issues. The findings of this study could be beneficial for the society since it has managed to conduct the interview and reveal relationships among major factors of cyber crime. The findings of this study could be used for devising and developing proper preventive and countermeasures against cyber crime, in turn reducing and preventing its damage.

Cyber Learning Program of a University Library's Information Literacy Education: Its Development and Course Management (도서관 정보이용교육: Cyber 강좌 개발과 실제 운영)

  • Lee, Choon-Shil
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.16 no.1
    • /
    • pp.5-26
    • /
    • 2005
  • Sookmyung Women's University Library developed a Cyber Learning Program for Information Literacy Education in the Fall semester of 2004. The program was enforced as a pass/fail prerequisite of the "Reading & Writing", a compulsory course for the first-year students. The paper describes why and how the university reached to the decision to initiate such a program. It identifies the factors which contributed to the early success of the program by analyzing the contents development process and the actual course management process. Suggestions for further developments is made by analyzing the technical and procedural difficulties faced using the Learning Management System(LMS).

  • PDF

A Study on the Model of Training Performance Measurement Specialized to Cyber Security Trainee for Cyber Security Professionals Acquisition (사이버보안 전문인력 획득을 위한 사이버보안 훈련생에 특화된 훈련성과 측정 모델에 관한 연구)

  • Kim, Kihoon;Eom, Jungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.4
    • /
    • pp.59-69
    • /
    • 2016
  • We proposed a specialized model of performance measurement to measure the training performance of the trainees in cyber practical training. Cyber security professionals are cultivating their expertise, skills, and competencies through cyber practical training in specialized education and training institutions. The our proposed process of trainee evaluation is consisted of an evaluation component discovery, evaluation item selection, evaluation index catalog, ratings and criteria decision, and calculation formula. The trainee evaluation is consisted of a formative evaluation during the training and an overall evaluation after finished training. Formative evaluation includes progress evaluation and participation evaluation, and overall evaluation includes practice evaluation and learning evaluation. The evaluation is weighted according to the importance of evaluation type. Because it is evaluated actual skills and abilities, competencies are assigned a high weight, while knowledge and attitudes are assigned a low weight. If cyber security trainees are evaluated by the proposed evaluation model, cyber security professionals can be cultivated by each skill and knowledge level and can be deployed by importance of security task.

Evaluative Criteria of Cyber Store based on Consumer Character of Cyber Stove Shoppers (사이버쇼핑 이용자의 소비자특성에 따른 가상점포 평가기준)

  • 박재옥;안민영
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.27 no.3_4
    • /
    • pp.441-451
    • /
    • 2003
  • The purpose of this study was to find out evaluative criteria of cyber store toward shopping orientation, purchasing experience and demographic factors of consumers to visit cyber store. This study surveyed consumers who have an experience of using cyber store and judgment sampling was used. The respondents were 240 men and women living in the metropolitan area of Seoul and Gyeonggi province. Research method was measured by clothing shopping orientation (utilitarian and hedonic factors), cyber store evaluation criteria (convenience, quality & trust and product character factors), purchasing experience(existent and nonexistent) and demographic factors. For data analysis, descriptive statistics, factor analysis, cluster analysis, ANOVA, t-test, Duncan test, and reliability analysis were conducted. The results were as follows: 1. Evaluative criteria of cyber store were considered importantly in order of possibility of exchange and refund, stability of personal information security, substance of quality degree of product and service and store. 2. Among shopping orientation groups, there were significant differences in all evaluative criteria of cyber store: convenience, quality & trust and product character of store. 3. Among groups toward existence and nonexistence in a purchasing experience, there were significant differences in convenience and quality & trust of store. 4. Among Demographic factors(gender, job, education and income) there were significant differences in convenience and quality & trust of store.

A Study for Recent major Cyber incidents and preventive measures (최근 주요 침해사고 유형과 예방 대책)

  • Jung, Ye-bin;Ha, Seong-hyeon;Lee, Se-Ho;Choi, Sang-Yong;Kim, Jeung-Sam;Lee, Jong-Rak
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.99-102
    • /
    • 2020
  • 인터넷 사용 인구가 증가하면서 이제 사이버공간은 우리 생활에서 중요한 인프라가 되었다. 최근 인터넷 침해사고의 추세는 주로 금전적인 이익을 얻기 위하여 발생하고 있으며, 그 수법이 갈수록 지능적이고 복합적인 기법들을 사용하여 대응과 분석이 점점 어려워지고 있다. 인터넷 침해사고는 이제 특정 개인, 기업의 문제가 아닌 사회적, 국가적 이슈가 되고 있다. 이처럼 인터넷 등 정보통신의 발달에 따른 생활의 편리함 등 순기능과 함께 해킹 등과 같은 역기능도 피할 수 없는 상황이다. 침해사고에 대한 대응은 특정 계급에 국한되는 것이 아니라 사이버공간을 이용하든 모든 사용자가 대비를 해야한다. 사이버 위협에 지속적으로 대비하고, 침해사고 예방 및 대응 수준과 사용자들의 보안 인식을 높혀 개인, 기업, 국가의 안전을 보장해야 할 것이다. 이에 본 연구에서는 침해사고 사례를 바탕으로 분석해 개인 인터넷 이용자들에게 인터넷 침해사고 예방 및 대응요령을 제공한다.

  • PDF

Evaluation of the Accuracy of the CyberKnife

  • Jang, Ji-Sun;Kang, Young-Nam;Choi, Byung-Ock;Choi, Ihl-Bohng;Kim, Moon-Chan;Shin, Dong-Oh;Shin, Dong-Ho;Cho, Kwang-Hwan;Min, Chul-Kee;Kwon, Soo-Il
    • Proceedings of the Korean Society of Medical Physics Conference
    • /
    • 2006.08a
    • /
    • pp.119-119
    • /
    • 2006
  • PDF

Design of the Cyber Education at the University-Level (대학교육에 있어서의 사이버 교육 구현 방안)

  • 김정희
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.7
    • /
    • pp.943-952
    • /
    • 2002
  • This paper discussed actualizing cyber education at the university education. First of all, I discussed the necessity of education based on the multimedia and web according to the change of loaming environment caused by development of technology. I discussed the Cyber education that are important application at university education. Next, I proposed the important elements that are required in constructing the Cyber education. Also, we discussed the structure and platform of Cyber education. Also, I reviewed the foreign and domestic Cyber education based on the multimedia and Web. Finally, I proposed the direction of future Cyber education.

  • PDF