• Title/Summary/Keyword: cyber space

Search Result 477, Processing Time 0.037 seconds

Juvenile Cyber Deviance Factors and Predictive Model Development Using a Mixed Method Approach (사이버비행 요인 파악 및 예측모델 개발: 혼합방법론 접근)

  • Shon, Sae Ah;Shin, Woo Sik;Kim, Hee Woong
    • The Journal of Information Systems
    • /
    • v.30 no.2
    • /
    • pp.29-56
    • /
    • 2021
  • Purpose Cyber deviance of adolescents has become a serious social problem. With a widespread use of smartphones, incidents of cyber deviance have increased in Korea and both quantitative and qualitative damages such as suicide and depression are increasing. Research has been conducted to understand diverse factors that explain adolescents' delinquency in cyber space. However, most previous studies have focused on a single theory or perspective. Therefore, this study aims to comprehensively analyze motivations of juvenile cyber deviance and to develop a predictive model for delinquent adolescents by integrating four different theories on cyber deviance. Design/methodology/approach By using data from Korean Children & Youth Panel Survey 2010, this study extracts 27 potential factors for cyber deivance based on four background theories including general strain, social learning, social bonding, and routine activity theories. Then this study employs econometric analysis to empirically assess the impact of potential factors and utilizes a machine learning approach to predict the likelihood of cyber deviance by adolescents. Findings This study found that general strain factors as well as social learning factors have positive effects on cyber deviance. Routine activity-related factors such as real-life delinquent behaviors and online activities also positively influence the likelihood of cyber diviance. On the other hand, social bonding factors such as community commitment and attachment to community lessen the likelihood of cyber deviance while social factors related to school activities are found to have positive impacts on cyber deviance. This study also found a predictive model using a deep learning algorithm indicates the highest prediction performance. This study contributes to the prevention of cyber deviance of teenagers in practice by understanding motivations for adolescents' delinquency and predicting potential cyber deviants.

Prospection of Power IT networks (전력 IT 네트워크 보안 전망)

  • Kim, Hak-Man;Kang, Dong-Joo
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.294-295
    • /
    • 2007
  • The importance of security is increased in power industry. Recently Power IT networks are attacked in cyber space and demage of attack become increased. For solving the problems, many research studies for network security enhancement are globally carried out in the world. In this paper, we introduce recent cyber attack cases, efforts for enhancing cyber safeness and put into perspective of potential security areas for power IT areas.

  • PDF

Cyber University records management system for remote testing automatic scoring open-ended research (사이버대학 성적관리를 위한 원격시험 주관식 자동채점 시스템 연구)

  • Park, Ki-Hong;Jang, Hae-Sook
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.01a
    • /
    • pp.117-118
    • /
    • 2014
  • 정보통신기술, 멀티미디어 기술 및 관련 소프트웨어 등을 이용하여 형성된 가상의 공간(Cyber-Space)에서 교수자와 학습자 간의 수업이 이뤄지는 사이버대학에서 학생들의 성적관리를 위한 원격시험 주관식 시험문제 자동채점 시스템을 연구하였다.

  • PDF

Cyber Threat under growth of Information Technology (정보기술 발전에 따른 사이버위협의 재조명)

  • 정관진
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.207-218
    • /
    • 2004
  • IT, the information technology's dramatic growth made entire society's system to rely on it, and took its place as one of the core keyword of 21st centurie's big variety. It is enlarging its role boundaries to most territories such as business or economy, and making another cyber space within cyber space. This report is going to review how we are defending ourselves from external threat within such dramatic flow of changes.

  • PDF

Cyber-physical System Framework for Smart Factory (스마트 공장을 위한 CPS 프레임워크 설계에 관한 연구)

  • Shin, Hyun-Jun;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.754-755
    • /
    • 2017
  • CPS refers to a computer-based component and system that closely connects various complicated processes and information of real space with the cyber space that provides data access and processing services through internet. In this paper, CPS was applied to shop-floor as a part of CPS research.

  • PDF

The Regulations by Criminal Law against any Libel in Cyberspace (사이버명예훼손행위와 형사법적 대응방안)

  • Yoo, In-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.177-183
    • /
    • 2012
  • There occur various crimes in cyber space hiding behind anonymity to avoid punishment by criminal law. One of the most serious crimes committed in cyber space is defamation against others under the cloak of freedom of expression. The infringements by defamations in cyber space are made all of a certain and widespread that the victims have no time to react, and for that reason, the shocks by the defamation are much serious and severe compared with that committed in off line. However, press and publication shouldn't infringe on other's honors, right, public order or social ethics in liberal democrat society which values much the human dignities and values as stipulated in Article 21 section 4 of the Constitution. Protection of personal honor is also the basic rights guaranteed by the Constitution as much as the freedom of expression, and by extension, such harmful behaviour shouldn't be included in the freedom of expression area. In this way, slander can be considered as the minimum limitation of the freedom of expression.

Fame-work Design on 3D Cyber Museum-Construction of Augmented Reality(AR) Creation Module of National Museum of Contemporary Art (3차원가상미술관 프레임워크디자인 - 국립현대미술관의 증강현실 창작모듈설계)

  • Lim, Janghoon
    • Trans-
    • /
    • v.9
    • /
    • pp.93-122
    • /
    • 2020
  • I intended to establish Augmented Reality(AR) Museum of 3D Cyber Space where artists and graphic designers can freely create in user integrated environment. This study is aimed at building a sufficient and integrated production environment for artists and graphic designers who utilize three-dimensional simulation methods in integrated development environment(IDE). This study intends to build a 3D simulation engine and a creation module of augment reality of 3D cyber space in Android platform to help artists and graphic designers to freely perform their creation in IDE. Based on these designs, I produced exhibition rooms of National Museum of Contemporary Art in 3D virtual space in which artists and graphic designers can put the graphics they have created on display, conducted a user survey and conducted tasking to an Android smartphone.

  • PDF

The threats and responses of cyber-terrorism in a new security environment: Issues and propositions on strategic frameworks (새로운 안보환경을 둘러싼 사이버 테러의 위협과 대응방안: 쟁점들과 전략적 접근 틀에 대한 논의)

  • Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.109-145
    • /
    • 2014
  • Despite much discussions on cyber-terrorism in South Korea, several missing issues could be addressed. This paper attempts to deal with such missing but important issues. In South Korea, there has been little attentions on cyber-terrorism with the respects of national security strategy development under macro framework responding to future security environment. This article focuses on such issues. In other words, the purpose of this paper evaluates the meaning of national security threats raised from cyber-terrorism as a mode of security threats and proposes the matter of cyber-terrorism within the development of national security strategy in the future security environment. several issues in this discussion pass some important messages for the construction of national security strategic approach framework within the future security environment adding cyber-space. in the future environment, a new space called cyber is added as an important external condition which might determine the security of individuals, societies, and nations. Therefore, the fundamental strategic framework should be prepared. After that, the trend and direction of future technological advancement should be understood and the identity, nature, and types of threat should be analyzed. Also, after that, various responses and countermeasures are together constituted in the aspect of function and system regarding various anticipated threats of the future human society including cyber-terrorism.

  • PDF