• Title/Summary/Keyword: cyber society

Search Result 2,480, Processing Time 0.035 seconds

The Survey for the Effectiveness of Cyber Lecture′s Main Components (사이버 강좌 주요 구성 요소의 효율적인 구현에 대한 수강생들의 반응조사)

  • 조세홍;엄종석;황대훈
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.4
    • /
    • pp.542-549
    • /
    • 2004
  • As a promising alternative for the traditional educational system, the cyber education is in the spotlight of both educators and computer scientists. There are many advantages of online education to the students and to the institution such as easy and random accessibility, low cost, saving spaces in the institutions, and so on. or a successful online education, some important factors would be considered in constructing cyber lectures. The purposes of this paper are to investigate students'viewpoints, called factors, of the cyber class and analyze these factors to be an effective cyber class. Once factors are identified, we trace the change of the student assessments on the identified factors during the class. Using these factors, we also examine if there are any differences on the assessment of the cyber class according to student background, such as gender. major, and class.

  • PDF

A Study on the Major Factors Influencing the Preference of Cyber University : Focusing on Market Segmentation of College Students by Conjoint Analysis (사이버대학교 선호도에 영향을 미치는 주요 요소에 관한 연구 : 컨조인트 분석에 의한 전문대 재학생 시장 세분화를 중심으로)

  • Lim Yangwhan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.2
    • /
    • pp.109-123
    • /
    • 2024
  • The purpose of this study is to identify strategic insights for cyber universities to secure a competitive advantage based on market analysis grounded in customer needs and motivations. As a research method, we surveyed and analyzed college students using conjoint analysis, identified the importance of cyber university components, estimated the utility of each detailed level, and identified the configuration of cyber universities most preferred by potential customers. In the study results, the importance of attributes that appeared by analyzing all respondents was in the order of 'expected ourcoms after graduation', 'department characteristic', 'cyber university name', and 'learning management style'. Cluster analysis was performed, divided into two groups, and conjoint analysis was performed. For Cluster 1, the importance values of the components were 'expected outcomes after graduation,' 'learning management style,' 'cyber university name,' and 'department characteristics,' in that order. For Cluster 2, the importance values were 'expected outcomes after graduation,' 'department characteristics,' 'cyber university name,' and 'learning management style,' in that order. As an application of the research, As an application of the study, it is suggested that analyzing the preferences of potential customers in the entire group is not accurate; therefore, segmenting the groups for analysis and strategy formulation can be useful.

Cyber Threat and Vulnerability Analysis-based Risk Assessment for Smart Ship

  • Jeoungkyu Lim;Yunja Yoo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.30 no.3
    • /
    • pp.263-274
    • /
    • 2024
  • The digitization of ship environments has increased the risk of cyberattacks on ships. The smartization and automation of ships are also likely to result in cyber threats. The International Maritime Organization (IMO) has discussed the establishment of regulations at the autonomous level and has revised existing agreements by dividing autonomous ships into four stages, where stages 1 and 2 are for sailors who are boarding ships while stages 3 and 4 are for those not boarding ships. In this study, the level of a smart ship was classified into LEVELs (LVs) 1 to 3 based on the autonomous levels specified by the IMO. Furthermore, a risk assessment for smart ships at various LVs in different risk scenarios was conducted The cyber threats and vulnerabilities of smart ships were analyzed by dividing them into administrative, physical, and technical security; and mitigation measures for each security area were derived. A total of 22 cyber threats were identified for the cyber asset (target system). We inferred that the higher the level of a smart ship, the greater the hyper connectivity and the remote access to operational technology systems; consequently, the greater the attack surface. Therefore, it is necessary to apply mitigation measures using technical security controls in environments with high-level smart ships.

A Study on the Framework for Analyzing the Effectiveness of Cyber Weapon Systems Associated with Cyberspace and Physical Space (사이버 공간과 물리 공간이 연계된 사이버 무기체계의 효과성 분석 프레임워크 연구)

  • Jang, Ji-su;Kim, Kook-jin;Yoon, Suk-joon;Park, Min-seo;Ahn, Myung-Kil;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.111-126
    • /
    • 2022
  • As operations that were only conducted in physical space in the past change to operations that include cyberspace, it is necessary to analyze how cyber attacks affect weapon systems using cyber systems. For this purpose, it would be meaningful to analyze a tool that analyzes the effects of physical weapon systems in connection with cyber. The ROK military has secured and is operating the US JMEM, which contains the results of analyzing the effects of physical weapon systems. JMEM is applied only to conventional weapon systems, so it is impossible to analyze the impact of cyber weapon systems. In this study, based on the previously conducted cyber attack damage assessment framework, a framework for analyzing the impact of cyber attacks on physical missions was presented. To this end, based on the MOE and MOP of physical warfare, a cyber index for the analysis of cyber weapon system effectiveness was calculated. In addition, in conjunction with JMEM, which is used as a weapon system effect manual in physical operations, a framework was designed and tested to determine the mission impact by comparing and analyzing the results of the battle in cyberspace with the effects of physical operations. In order to prove the proposed framework, we analyzed and designed operational scenarios through domestic and foreign military manuals and previous studies, defined assets, and conducted experiments. As a result of the experiment, the larger the decrease in the cyber mission effect value, the greater the effect on physical operations. It can be used to predict the impact of physical operations caused by cyber attacks in various operations, and it will help the battlefield commander to make quick decisions.

The revitalization methods for the cyber community to consolidate the communities in apartment complexes;focused on the contents of their web sites (아파트 단지 내 공동체 강화를 위한 사이버 커뮤니티 활성화 방안;웹사이트상의 컨텐츠 현황과 이용실태를 중심으로)

  • Lee, Young-Ae;Kang, Soon-Joo
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 2006.11a
    • /
    • pp.185-189
    • /
    • 2006
  • attention to the elevation of the Quality of living, various ways to revitalize the community spirit are found including reforming hardhearted neighborhoods and overcoming the dreariness of city. With the development of the internet and the spread(dissemination) of "digital home", the communities in cyber space are especially active since we are living in an information-oriented society. To consolidate the communities in apartment complexes, this study tries to find revitalization methods of the cyber community by analyzing the contents of the web sites, understanding the cyber community. The cyber contents that are provided come from three main companies that develop the internet apartments. These are compared and analyzed. The related cyber communities("cafe") are also analyzed. The results are as follows. 1)Though they have some differences on details, the content provided from internet companies can be categorized as introduction to the apartment complex, personal service, community, club and internet shopping. 2)The contents on the cyber community made by the residents are mostly for clubs and chatting since they are made for communication between residents. 3)To revitalize the cyber community, the content that gets more attention from the residents needs to be subdivided into groups.

  • PDF

DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective

  • Kim, Jiyeon;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2186-2203
    • /
    • 2020
  • Security administrators of companies and organizations need to come up with proper countermeasures against cyber-attacks considering infrastructures and security policies in their possession. In order to develop and verify such countermeasures, the administrators should be able to reenact both cyber-attacks and defenses. Simulations can be useful for the reenactment by overcoming its limitations including high risk and cost. If the administrators are able to design various scenarios of cyber-attacks and to develop simulation models from their viewpoints, they can simulate desired situations and observe the results more easily. It is challenging to simulate cyber-security issues, because there is lack of theoretical basis for modeling a wide range of the security field as well as pre-defined basic components used to model cyber-attacks. In this paper, we propose a modeling method for cyber-security simulations by developing a basic component and a composite model, called Abstracted Cyber-Security Unit Model (ACSUM) and Abstracted Cyber-security SIMulation model (ACSIM), respectively. The proposed models are based on DEVS(Discrete Event systems Specification) formalism, a modeling theory for discrete event simulations. We develop attack scenarios by sequencing attack behaviors using ACSUMs and then model ACSIMs by combining and abstracting the ACSUMs from a security perspective. The concepts of ACSUM and ACSIM enable the security administrators to simulate numerous cyber-security issues from their viewpoints. As a case study, we model a worm scenario using ACSUM and simulate three types of simulation models based on ACSIM from a different security perspective.

Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

  • Shin, Jinsoo;Son, Hanseong;Heo, Gyunyoung
    • Nuclear Engineering and Technology
    • /
    • v.49 no.3
    • /
    • pp.517-524
    • /
    • 2017
  • Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks.

Cyber Security Considerations and Countermeasures for UAM Air Traffic Management Infrastructure (UAM 항공교통관리 인프라의 사이버보안 고려사항 및 대응방안)

  • Kyungwook Kim
    • Journal of Information Technology Applications and Management
    • /
    • v.30 no.6
    • /
    • pp.17-29
    • /
    • 2023
  • In this paper, we aim to propose cyber security considerations and countermeasures for infrastructure and services in the UAM(Urban Air Mobility) Air Traffic Management field, which is one of the key elements of the UAM market that has not yet bloomed. Air traffic management is an important factor for safe navigation and social acceptance of UAM. In order to realize air traffic management, infrastructure and services based on solid network connectivity must be established. And for industries where connectivity is the core component, it can become an infiltration route for cyber threats. Therefore, cyber security is essential for the infrastructure and services. In detail, we will look into the definition of the existing air traffic management field and the cyber threats. In addition, we intend to identify cyber security threat scenarios that may occur in the newly designed UAM air traffic management infrastructure. Moreover, in order to study the cyber security countermeasures of the UAM air traffic management infrastructure, there will be analysis of the UAM operation concept. As a result, countermeasures applicable to the infrastructure and service fields will be suggested by referring to the cyber security frameworks.

A Preliminary Study on the Effectiveness of Cyber Counseling (사이버 상담 활성화를 위한 탐색 연구)

  • 장진경
    • Journal of Families and Better Life
    • /
    • v.20 no.4
    • /
    • pp.135-148
    • /
    • 2002
  • The main purpose of this research was to explore the factors that encourage people to use the cyber counseling in resolving difficulties in their lives. Another purpose of this research was to investigate whether cyber counseling really helps people feel better. For this study, a structured survey questionnaire was distributed both on- and off-line, and 429 respondents returned completed survey forms. The major statistical methods used for data analysis were frequency, factor analysis, 1-test and ANOVA. The results of this study revealed that variables such as gender, age, occupation, internet skills, time of internet use, personality, and the awareness of cyber counseling made a difference in people's use of cyber counseling whenever they felt they needed it. However, cyber counseling seemed to fail to increase feelings of well being in people's lives. The implications of these findings are discussed in this article.

Analysis of Client Propensity in Cyber Counseling Using Bayesian Variable Selection

  • Pi, Su-Young
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.6 no.4
    • /
    • pp.277-281
    • /
    • 2006
  • Cyber counseling, one of the most compatible type of consultation for the information society, enables people to reveal their mental agonies and private problems anonymously, since it does not require face-to-face interview between a counsellor and a client. However, there are few cyber counseling centers which provide high quality and trustworthy service, although the number of cyber counseling center has highly increased. Therefore, this paper is intended to enable an appropriate consultation for each client by analyzing client propensity using Bayesian variable selection. Bayesian variable selection is superior to stepwise regression analysis method in finding out a regression model. Stepwise regression analysis method, which has been generally used to analyze individual propensity in linear regression model, is not efficient since it is hard to select a proper model for its own defects. In this paper, based on the case database of current cyber counseling centers in the web, we will analyze clients' propensities using Bayesian variable selection to enable individually target counseling and to activate cyber counseling programs.