• Title/Summary/Keyword: cyber-university

Search Result 2,828, Processing Time 0.029 seconds

Automatic malware generation system design using EA (진화알고리즘을 이용한 악성코드 자동생성 시스템 설계)

  • Kwon, Se-Hoon;Kown, Jae-Yeong;Lee, Seung-Hun;Lee, Hyun-Woo;Lee, Jong-Rak;Won, Il-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.193-196
    • /
    • 2017
  • 본 연구는 기존의 변종 악성코드와는 달리 진화알고리즘을 기반으로 한 악성코드 자동 생성 프레임워크에 대한 것이다. 우리가 제안하는 시스템은 소스가 알려지지 않는 바이너리 상태의 악성코드를 역공학적 기법을 이용하여 소스 상태로 복원하고 복원된 소스를 이용하여 다양한 변종 악성코드를 생성하는 것이다. 진화 연산을 적용하기 위해 평가함수의 설계가 중요한데, 우리는 행동 기반 분석 기반의 평가 함수를 포함하는 프레임워크를 제안하였다.

The Relationship between Cyber Characteristics and Malicious Comments on Facebook : The Role of Anonymity and Dissemination (페이스북에서 사이버 특성과 악성댓글의 관계 : 익명성과 전파성의 역할)

  • Kim, Han-Min
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.1
    • /
    • pp.87-104
    • /
    • 2018
  • The internet is spreading widely and malicious comments which is a negative aspect is increasing. Previous studies have considered anonymity as a cyber characteristic of malicious comments. However, there are a theoretical confusion due to inconsistent results. In addition, the dissemination, one of cyber characteristics, have been mentioned the theoretical relationship on malicious comments, but measurement and empirical study about dissemination were still limited. Therefore, this study developed a measurement of dissemination and investigated the relationship between cyber characteristics (anonymity, dissemination) and malicious comments on Facebook. As a result of research, this study identified that anonymity is not significant on malicious comments and discovered that the dissemination of cyber space has a direct influence on malicious comments. This study suggests that information systems can contribute to malicious comments researches by proposing cyber characteristics.

Effectiveness of Cyber Home Study for Improving Self-Directed Learning Ability in Mathematics (사이버 가정학습이 자기주도적 학습능력 향상에 미치는 효과)

  • Jung, Mi-Young;Kim, Won-Kyung
    • The Mathematical Education
    • /
    • v.47 no.4
    • /
    • pp.467-486
    • /
    • 2008
  • The purpose of this study is to investigate effectiveness of the cyber home study to improve the self-directed learning ability. For this study, 21 middle school students took voluntarily part in the 4 weeks cyber home study in Wulsan teaching & learning center and 3 students were interviewed among them. The results of this study were as follows; First, the 4-weeks experimental cyber home study is shown to be effective for improving the self-directed learning ability, specialty for the intermediate and low level students, Second, it is shown that the cyber home study enable students to have positive attitude as well as interest and confidence in the mathematical learning.

  • PDF

The Level of Self-Directedness : A Parameter for the Success of Cyber Education

  • Yum, Ji-Hwan
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.3
    • /
    • pp.101-111
    • /
    • 2009
  • The study reveals the relationships between the level of self-directedness and educational performance of students in the cyber education environment. Where the motivations for participating cyber education may vary, the final destination of education may be the same-improving the level of self achievement by study. As the researchers believe that the paramount success factor of cyber education would be self-directedness, we probed the factors to build UP self-directedness. Researchers developed the level of self-directedness as object-orientation, action-orientation, and learning orientation. Those composite orientations were compared with learning achievement. The study showed the significant relationship between some factors of self-directedness and educational performance.

  • PDF

ICT Adoption and Cyber Security of Korean SMEs (중소기업의 ICT 도입과 사이버 안전에 관한 연구)

  • Jung, Jeyong
    • Journal of the Korea Safety Management & Science
    • /
    • v.23 no.2
    • /
    • pp.53-63
    • /
    • 2021
  • Small and medium-sized enterprises(SMEs) continue to adopt ICT to gain an edge in organizational innovation and competition. This has a management advantage, but it also brings vulnerabilities as to cyber security. Therefore, the purpose of this study is to conduct an exploratory study on the cyber security situation of SMEs. A survey was conducted on Korean SMEs to determine how well they are connected to ICT and how much they are exposed to cyber security threats. The results suggest two things. First, Korean SMEs are well connected to ICT, but there is a gap between the actual adoption and human recognition of its importance. Second, security threats and breaches affect the majority of SMEs, but several problems including costs have not been properly evaluated. The results of this study are expected to help improve the cyber security management system of Korean SMEs.

A Systematic Review on Human Factors in Cybersecurity

  • Alghamdi, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.282-290
    • /
    • 2022
  • A huge budget is spent on technological solutions to protect Information Systems from cyberattacks by organizations. However, it is not enough to invest alone in technology-based protection and to keep humans out of the cyber loop. Humans are considered the weakest link in cybersecurity chain and most of the time unaware that their actions and behaviors have consequences in cyber space. Therefore, humans' aspects cannot be neglected in cyber security field. In this work we carry out a systematic literature review to identify human factors in cybersecurity. A total of 27 papers were selected to be included in the review, which focuses on the human factors in cyber security. The results show that in total of 14 identified human factors, risk perception, lack of awareness, IT skills and gender are considered critical for organization as for as cyber security is concern. Our results presented a further step in understanding human factors that may cause issues for organizations in cyber space and focusing on the need of a customized and inclusive training and awareness programs.

Significance and Research Challenges of Defensive and Offensive Cybersecurity in Smart Grid

  • Hana, Mujlid
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.29-36
    • /
    • 2022
  • Smart grid (SG) software platforms and communication networks that run and manage the entire grid are increasingly concerned about cyber security. Characteristics of the smart grid networks, including heterogeneity, time restrictions, bandwidth, scalability, and other factors make it difficult to secure. The age-old strategy of "building bigger walls" is no longer sufficient given the rise in the quantity and size of cyberattacks as well as the sophisticated methods threat actor uses to hide their actions. Cyber security experts utilize technologies and procedures to defend IT systems and data from intruders. The primary objective of every organization's cybersecurity team is to safeguard data and information technology (IT) infrastructure. Consequently, further research is required to create guidelines and methods that are compatible with smart grid security. In this study, we have discussed objectives of of smart grid security, challenges of smart grid security, defensive cybersecurity techniques, offensive cybersecurity techniques and open research challenges of cybersecurity.

The Effect of Motivation on Cyber Plagiarism in Using Social Media: The Focus of Subjective Norm's moderating Effect (소셜 미디어 사용에서 동기부여가 사이버 표절에 미치는 영향: 주관적 규범의 조절효과를 중심으로)

  • Kang, Sora;Han, Su Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.6
    • /
    • pp.300-307
    • /
    • 2016
  • The development of computer-based information technology has led to the quantitative and qualitative growth of social media which have two sides; a positive one such as the generation and sharing of information and a negative one which includes cyber plagiarism and cyber bullying. This study seeks to understand which factors can lead to cyber plagiarism, which is the most prevalent form of unethical cyber behavior. We expected that the intrinsic and extrinsic motivations for using social media would have different effects on unethical cyber intention and that this relation between motivation and cyber unethical behavior would be moderated by the subjective norm. In order to obtain a better understanding of the relationships among the individual motivation, unethical cyber intention, and cyber plagiarism, information was obtained from 564 social media users. The respondents provided details of their experiences and attitudes regarding social media usage behavior and unethical cyber behavior. The results confirmed that extrinsic motivation significantly increases unethical intention and further leads to high levels of cyber plagiarism. The subjective norm plays a moderating role in the relationships between extrinsic motivation and unethical cyber intention. Based on the results, the theoretical and practical implications of the research findings are discussed, and recommendations for future research are provided.

National Culture And Its Impacts On Cyber Diplomacy

  • Shin, Min-Soo;Khurshid, Sharipov
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.415-420
    • /
    • 2007
  • Diffusion of information and communication technologies is a global phenomenon. In spite of rapid globalization there are considerable differences between nations in terms of the adoption and usage of new technologies. Several studies exploring causal factors including national cultures of information and communication technology adoption have been carried out. The focus of this paper is slightly different from other studies in this area. Rather than concentrating on the individual information technology the cyber diplomacy is the focus. This research conducted an analysis of the impact national culture has on adoption of the cyber diplomacy and its components for 95 countries. The national cultural dimensions were identified using Hofstede's model of cultural differences. The research model and hypotheses were formed and tested using correlation and regression analysis. The findings indicate that worldwide cyber diplomacy adoption is related to national culture. The result has theoretical and practical implications.

  • PDF

A Study on the Cyber Violence of Juvenile (청소년의 사이버 폭력에 관한 연구)

  • Lee, Ga Yun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.01a
    • /
    • pp.129-131
    • /
    • 2013
  • 본 논문에서는 정보화의 발전에 따라 사이버 공간에서의 청소년들의 사이버 폭력이 증가하고 있는 현실에 비추어 사이버 폭력의 개념과 유형을 알아보고 청소년들의 사이버 폭력의 발생 원인에 대해 청소년의 유일한 놀이문화로의 인터넷, 스트레스 해소, 청소년의 인정받고 싶은 욕구만족, 사이버 폭력에 대한 죄의식 결여로 나누어 간략히 살펴보고, 청소년의 사이버 폭력의 예방을 위한 대응방안에 대해 건전한 사이버 공간의 형성, 온라인서비스제공자(OSP)의 책임 강화, 사이버윤리교육 강화 등을 들어 보았다.

  • PDF