• Title/Summary/Keyword: cyber-university

Search Result 2,795, Processing Time 0.032 seconds

Consumer Satisfaction Model for Cyber Learning: Focused on Expectation-disconfirmation Paradigm (가상강의에 대한 소비자만족모델: 기대불일치 패러다임을 중심으로)

  • Yoo, Hyun-Jung
    • Korean Journal of Human Ecology
    • /
    • v.19 no.2
    • /
    • pp.295-310
    • /
    • 2010
  • This study measured college students' levels of satisfaction with their cyber learning through an online survey of students who had taken one or more cyber learning before. 500 returned and usable questionnaires were analyzed and SPSS WIN 12.0 was used for the descriptive statistics, t-test, factor analysis and analysis of covariance structures. The results are as follows; First, college students were very interested in their cyber learning. Their decision to take the cyber learning was initiated more by emotional motives (m=3.13) than by rational motives (m=3.35). Second, the consumers' expectations for the cyber learning were divided into the 'Expectation for service quality' and the 'Expectation for economy,' and their 'Expectation for economy'(m=4.02) was higher than their 'Expectations for service quality'(m=3.60). Third, the consumers' expectations for the cyber learning and the results of the cyber learning were analyzed, and a discrepancy between these two were also analyzed. The analysis of discrepancy between the two showed that the average of the results was lower than that of the expectations, which means that the cyber learning did not meet the consumers' expectations in every aspect, However, the average satisfaction level was 3.20, which means consumers were satisfied with the cyber learning overall. Fourth, causes of dissatisfaction with the cyber learning were divided into internal factors due to personal matters and external factors due to classes and other factors. It was found that dissatisfaction due to internal factors was greater than that due to external factors. Lastly, the factors affecting satisfaction/dissatisfaction with the cyber learning and willingness to use it again were analyzed. The results showed that the motive for its use affected the formation of expectation but it did not affect the results. Satisfaction with the cyber learning affected the willingness to use it again positively. However, the effect of dissatisfaction on the willingness to use it again was not statistically significant.

A Study on Improving Support for Victims of Cyber-Violence (사이버 폭력의 피해자 지원에 대한 개선방안)

  • Park, Jong-Ryeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.1
    • /
    • pp.227-233
    • /
    • 2012
  • Recently, violence in cyberspace has been increasing and it causes not only severe emotional distress to the victims but also hampers a healthy cyber culture. This paper aims to find out about characteristics and the actual state of Cyber-Violence, and Evaluate the measures concerning it. Cyber crime is characterized as non face to face, anonymity, non-limitary, difficulties in attracting evidence, the Cyber Violence of these cyber crimes was shown in the form of cyber-insult, cyber-defamation, cyber-stalking, circulation of cyber-pornography, and that is the reality there are lack of practical measures. As a measure for protection the establishment of positive laws are needed on the cyber-contempt, adopting the Internet real-name system, strengthening the ISP's responsibility and legislation for criminal penalties. As a more fundamental measure, a greater effort of netizen's self-purification and systematic training and promotion for the prevention of damage is necessary.

The Effect of Tension and Low Self-Control on Cyber Deviation: Analyzing The Mediating Effect of Internet Addiction and Moderating Effect of Anonymity (긴장과 낮은 자기통제력이 사이버일탈에 미치는 영향: 인터넷 중독의 매개효과와 익명성의 조절효과 검증)

  • Nam, Su-Jung
    • Journal of the Korean Home Economics Association
    • /
    • v.49 no.2
    • /
    • pp.63-74
    • /
    • 2011
  • Tension and self-control are explanatory factors in adolescent delinquency, and internet addiction and anonymity are regarded as factors underlying cyber deviation. The aim of this study was to investigate the interrelationships between these factors and cyber deviation. Participants were 485 middle and high school students in the Jeonbuk region. The results showed that tension and self-control were predictors of cyber deviation and that internet addiction was a mediating variable for both the predictors. Anonymity was found to have a mediating role, but only in respect of the tension-cyber deviation pathway. These findings suggested a number of implications. Firstly, the educational programs on cyber deviation should be different from the existing deviation prevention programs. Secondly, measures to prevent internet addiction are needed for the effective prevention of cyber deviation. Lastly, the finding of a relationship between anonymity and cyber deviation indicates the need to adopt a long-term perspective drawing on values education techniques to develop a code of cyber space ethics for "netizens".

An Overview of False Data Injection Attack Against Cyber Physical Power System (사이버 물리 전력 시스템에 대한 허위 데이터 주입 공격에 관한 고찰)

  • Bae, Junhyung
    • Journal of IKEEE
    • /
    • v.26 no.3
    • /
    • pp.389-395
    • /
    • 2022
  • With the evolution of technology, cyber physical systems (CPSs) are being upgraded, and new types of cyber attacks are being discovered accordingly. There are many forms of cyber attack, and all cyber attacks are made to manipulate the target systems. A representative system among cyber physical systems is a cyber physical power system (CPPS), that is, a smart grid. Smart grid is a new type of power system that provides reliable, safe, and efficient energy transmission and distribution. In this paper, specific types of cyber attacks well known as false data injection attacks targeting state estimation and energy distribution of smart grid, and protection strategies for defense of these attacks and dynamic monitoring for detection are described.

The Relationship between Cyber Leisure Activity and Autonomic Function in High School Students (청소년의 사이버 여가활동과 자율신경계 기능의 관계)

  • Son, Mi-Eun;Kim, Na-Hyun
    • Journal of Korean Biological Nursing Science
    • /
    • v.14 no.1
    • /
    • pp.33-40
    • /
    • 2012
  • Purpose: The purpose of this study was to explore the relationship between cyber leisure activity and autonomic function in high school students. Methods: The subjects of this study were 242 second graders at high school located in D city. The research design was descriptive correlation study. Data were collected from August 26 to September 17, 2010, using a cyber leisure questionnaire and heart rate variability (SA-6000, Medicore, Korea) for autonomic function. Results: Total time for the cyber leisure activity was $391.3{\pm}262.0$ (min/week). Time for internet usage and computer game was $234.5{\pm}140.1$ (min/week) and $156.8{\pm}164.3$ (min/week), respectively. There were significant positive correlation between total cyber leisure time and sympathetic activity (r=.247, $p$ <.001). Conclusion: Excessive cyber leisure activity could increase sympathetic activities in high school students. Thus, nursing intervention to reduce the total cyber leisure time will be helpful to improve their neurophysiological status.

Cyber Insurance and Distribution Channels

  • Kwak, Young-Arm;Cho, Young-Sang
    • Journal of Distribution Science
    • /
    • v.16 no.5
    • /
    • pp.61-70
    • /
    • 2018
  • Purpose - These days, an individual user, private entity, hears everyday news of hacking and personal information leakage in the era of a most-connected society. This study investigates cyber attack, cyber insurance and distribution channels for insurance goods in South Korea by analyzing various cases of cyber attacks in domestic and overseas case. Research design, data and methodology - This study adopted various study cases instead of the one large case for deep quality analysis, and focused on various cases of domestic and overseas cyber attacks with insurance. Result - As a result of analyzing the cases that were hacked, types of massive losses and damages arising out of internet blackout due to cyber risks are paralyzation of public and private website and portal, electronic administrative system, public infrastructure, and consequently a normal operation of nation is impossible. These losses and damages however can be coverable under cyber insurance. Conclusions - This paper suggests insurance carriers, as suppliers, should provide multiple channels to sell to the customer and should expand the strategy of advertisement and promotion in order for them to change their mind and compare the price and value of the information of individual users and private entity in view of cost savings.

Cyber risk measurement via loss distribution approach and GARCH model

  • Sanghee Kim;Seongjoo Song
    • Communications for Statistical Applications and Methods
    • /
    • v.30 no.1
    • /
    • pp.75-94
    • /
    • 2023
  • The growing trend of cyber risk has put forward the importance of cyber risk management. Cyber risk is defined as an accidental or intentional risk related to information and technology assets. Although cyber risk is a subset of operational risk, it is reported to be handled differently from operational risk due to its different features of the loss distribution. In this study, we aim to detect the characteristics of cyber loss and find a suitable model by measuring value at risk (VaR). We use the loss distribution approach (LDA) and the time series model to describe cyber losses of financial and non-financial business sectors, provided in SAS® OpRisk Global Data. Peaks over threshold (POT) method is also incorporated to improve the risk measurement. For the financial sector, the LDA and GARCH model with POT perform better than those without POT, respectively. The same result is obtained for the non-financial sector, although the differences are not significant. We also build a two-dimensional model reflecting the dependence structure between financial and non-financial sectors through a bivariate copula and check the model adequacy through VaR.

Study On Identifying Cyber Attack Classification Through The Analysis of Cyber Attack Intention (사이버공격 의도분석을 통한 공격유형 분류에 관한 연구 - 사이버공격의 정치·경제적 피해분석을 중심으로 -)

  • Park, Sang-min;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.103-113
    • /
    • 2017
  • Cyber attacks can be classified by type of cyber war, terrorism and crime etc., depending on the purpose and intent. Those are mobilized the various means and tactics which are like hacking, DDoS, propaganda. The damage caused by cyber attacks can be calculated by a variety of categories. We may identify cyber attackers to pursue trace-back based facts including digital forensics etc. However, recent cyber attacks are trying to induce confusion and deception through the manipulation of digital information or even conceal the attack. Therefore, we need to do the harm-based analysis. In this paper, we analyze the damage caused during cyber attacks from economic and political point of view and by inferring the attack intent could classify types of cyber attacks.

Research on System Architecture and Methodology based on MITRE ATT&CK for Experiment Analysis on Cyber Warfare Simulation

  • Ahn, Myung Kil;Lee, Jung-Ryun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.31-37
    • /
    • 2020
  • In this paper, we propose a system architecture and methodology based on cyber kill chain and MITRE ATT&CK for experiment analysis on cyber warfare simulation. Threat analysis is possible by applying various attacks that have actually occurred with continuous updates to reflect newly emerging attacks. In terms of cyber attack and defense, the current system(AS-IS) and the new system(TO-BE) are analyzed for effectiveness and quantitative results are presented. It can be used to establish proactive cyber COA(Course of Action) strategy, and also for strategic decision making. Through a case study, we presented the usability of the system architecture and methodology proposed in this paper. The proposed method will contribute to strengthening cyber warfare capabilities by increasing the level of technology for cyber warfare experiments.

Maritime Cyber Security Issues and Risk Management Trends (해양 사이버 보안사고 및 위험 관리 사항 동향)

  • Dong-Woo Kang;Ki-Hwan Kim;Young-Sil Lee
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.4
    • /
    • pp.209-215
    • /
    • 2022
  • The International Maritime Organization, which is in charge of the international maritime environment and ship safety, has rapidly promoted cyber systems for international dimension agreement and efficiency improvement and improved nautical efficiency. Nevertheless, maritime cyber system attacks still occur every year, and in particular, the number of international maritime cyber security incidents in 2021 appeared to increase sharply compared to 2020. This paper discusses the areas that should be taken into account in order to reduce the increasing sophistication of maritime cyber security. To this end, we will look at typical cases of cyber attacks that have increased sharply in 2021 and analyze the causes of the continuous occurrence of maritime cyber security incidents. In addition, we present several cyber system proposals regarding the current state of maritime cyber systems and the solutions to the problems they face, as well as the matters to be addressed for future maritime cyber systems that will be advanced.