• Title/Summary/Keyword: cyber-university

Search Result 2,795, Processing Time 0.045 seconds

Cyber University Students' Perceptions of a DST Project to Develop English Skills

  • Moon, Dosik
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.200-206
    • /
    • 2020
  • Digital storytelling, a 21st century educational tool that combines digital media with storytelling, is considered as a powerful tool to learn foreign languages in an authentic and meaningful way. This study explored cyber university students' perceptions and experiences with a digital storytelling project implemented to enhance their English writing and speaking skills. The results of 9 week-long research indicated that most of the students' attitudes were positive: the digital storytelling project was effective to increase their English skills, learning motivation and interest in learning English. Most students perceived that the process writing approach and videotaping tasks provided them with good opportunities to develop their English writing and speaking skills. Although many students had difficulties selecting a topic and writing a script in the initial stage, they could handle with these challenges with the help of professors' feedback and successfully completed their projects. After completing the project, most students expressed a strong sense of accomplishment. These results suggest that the digital storytelling project effectively met cyber university students' learning needs and facilitate their English learning.

Analysis of Client Propensity in Cyber Counseling Using Bayesian Variable Selection

  • Pi, Su-Young
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.6 no.4
    • /
    • pp.277-281
    • /
    • 2006
  • Cyber counseling, one of the most compatible type of consultation for the information society, enables people to reveal their mental agonies and private problems anonymously, since it does not require face-to-face interview between a counsellor and a client. However, there are few cyber counseling centers which provide high quality and trustworthy service, although the number of cyber counseling center has highly increased. Therefore, this paper is intended to enable an appropriate consultation for each client by analyzing client propensity using Bayesian variable selection. Bayesian variable selection is superior to stepwise regression analysis method in finding out a regression model. Stepwise regression analysis method, which has been generally used to analyze individual propensity in linear regression model, is not efficient since it is hard to select a proper model for its own defects. In this paper, based on the case database of current cyber counseling centers in the web, we will analyze clients' propensities using Bayesian variable selection to enable individually target counseling and to activate cyber counseling programs.

Optimization of Cyber-Attack Detection Using the Deep Learning Network

  • Duong, Lai Van
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.159-168
    • /
    • 2021
  • Detecting cyber-attacks using machine learning or deep learning is being studied and applied widely in network intrusion detection systems. We noticed that the application of deep learning algorithms yielded many good results. However, because each deep learning model has different architecture and characteristics with certain advantages and disadvantages, so those deep learning models are only suitable for specific datasets or features. In this paper, in order to optimize the process of detecting cyber-attacks, we propose the idea of building a new deep learning network model based on the association and combination of individual deep learning models. In particular, based on the architecture of 2 deep learning models: Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM), we combine them into a combined deep learning network for detecting cyber-attacks based on network traffic. The experimental results in Section IV.D have demonstrated that our proposal using the CNN-LSTM deep learning model for detecting cyber-attacks based on network traffic is completely correct because the results of this model are much better than some individual deep learning models on all measures.

A Study on Relationship between Media Environment and Adolescent Cyber-Delinquency : Focused on X-rated Media Commitment (매체환경과 청소년 사이버비행과의 관계에 대한 연구 : 성인매체몰입을 중심으로)

  • Lee, Chang-Moon;Moon, Jin-Young;Park, Ju-Won
    • Journal of Digital Convergence
    • /
    • v.17 no.4
    • /
    • pp.365-379
    • /
    • 2019
  • The purpose of this study is to investigate what factors affect cyber-delinquency after examining the previous research focusing on the general strain theory and the delinquency opportunity theory in the existing studies. And as adolescents move from middle school to high school, this study is intended to analyze what factors affect cyber-delinquency from a longitudinal perspective using KCYPS(Korea Child and Youth Panel Survey) elementary 4th grade fourth and seventh data. The adolescence cyber-delinquency probability of occurrence were analyzed through the panel logit fixed-effect model using STATA. And then the cyber-delinquency frequency of adolescents were analyzed through the panel tobit random-effect model. As a result of analyzing the factors affecting cyber-delinquency frequency, Adult media commitment, computer use time, and cell phone dependency increased cyber-delinquency frequency. On the other hand, among the parenting attitudes, the attitude of supervising attentively and adolescents' age-increasing decreased cyber-delinquency frequency.

A Study of Reinforcement Learning-based Cyber Attack Prediction using Network Attack Simulator (NASim) (네트워크 공격 시뮬레이터를 이용한 강화학습 기반 사이버 공격 예측 연구)

  • Bum-Sok Kim;Jung-Hyun Kim;Min-Suk Kim
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.3
    • /
    • pp.112-118
    • /
    • 2023
  • As technology advances, the need for enhanced preparedness against cyber-attacks becomes an increasingly critical problem. Therefore, it is imperative to consider various circumstances and to prepare for cyber-attack strategic technology. This paper proposes a method to solve network security problems by applying reinforcement learning to cyber-security. In general, traditional static cyber-security methods have difficulty effectively responding to modern dynamic attack patterns. To address this, we implement cyber-attack scenarios such as 'Tiny Alpha' and 'Small Alpha' and evaluate the performance of various reinforcement learning methods using Network Attack Simulator, which is a cyber-attack simulation environment based on the gymnasium (formerly Open AI gym) interface. In addition, we experimented with different RL algorithms such as value-based methods (Q-Learning, Deep-Q-Network, and Double Deep-Q-Network) and policy-based methods (Actor-Critic). As a result, we observed that value-based methods with discrete action spaces consistently outperformed policy-based methods with continuous action spaces, demonstrating a performance difference ranging from a minimum of 20.9% to a maximum of 53.2%. This result shows that the scheme not only suggests opportunities for enhancing cybersecurity strategies, but also indicates potential applications in cyber-security education and system validation across a large number of domains such as military, government, and corporate sectors.

  • PDF

DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective

  • Kim, Jiyeon;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2186-2203
    • /
    • 2020
  • Security administrators of companies and organizations need to come up with proper countermeasures against cyber-attacks considering infrastructures and security policies in their possession. In order to develop and verify such countermeasures, the administrators should be able to reenact both cyber-attacks and defenses. Simulations can be useful for the reenactment by overcoming its limitations including high risk and cost. If the administrators are able to design various scenarios of cyber-attacks and to develop simulation models from their viewpoints, they can simulate desired situations and observe the results more easily. It is challenging to simulate cyber-security issues, because there is lack of theoretical basis for modeling a wide range of the security field as well as pre-defined basic components used to model cyber-attacks. In this paper, we propose a modeling method for cyber-security simulations by developing a basic component and a composite model, called Abstracted Cyber-Security Unit Model (ACSUM) and Abstracted Cyber-security SIMulation model (ACSIM), respectively. The proposed models are based on DEVS(Discrete Event systems Specification) formalism, a modeling theory for discrete event simulations. We develop attack scenarios by sequencing attack behaviors using ACSUMs and then model ACSIMs by combining and abstracting the ACSUMs from a security perspective. The concepts of ACSUM and ACSIM enable the security administrators to simulate numerous cyber-security issues from their viewpoints. As a case study, we model a worm scenario using ACSUM and simulate three types of simulation models based on ACSIM from a different security perspective.

Cyber Security Considerations and Countermeasures for UAM Air Traffic Management Infrastructure (UAM 항공교통관리 인프라의 사이버보안 고려사항 및 대응방안)

  • Kyungwook Kim
    • Journal of Information Technology Applications and Management
    • /
    • v.30 no.6
    • /
    • pp.17-29
    • /
    • 2023
  • In this paper, we aim to propose cyber security considerations and countermeasures for infrastructure and services in the UAM(Urban Air Mobility) Air Traffic Management field, which is one of the key elements of the UAM market that has not yet bloomed. Air traffic management is an important factor for safe navigation and social acceptance of UAM. In order to realize air traffic management, infrastructure and services based on solid network connectivity must be established. And for industries where connectivity is the core component, it can become an infiltration route for cyber threats. Therefore, cyber security is essential for the infrastructure and services. In detail, we will look into the definition of the existing air traffic management field and the cyber threats. In addition, we intend to identify cyber security threat scenarios that may occur in the newly designed UAM air traffic management infrastructure. Moreover, in order to study the cyber security countermeasures of the UAM air traffic management infrastructure, there will be analysis of the UAM operation concept. As a result, countermeasures applicable to the infrastructure and service fields will be suggested by referring to the cyber security frameworks.

A Study on the Effectiveness of the Cyber Home Learning System (사이버가정학습 효과성에 대한 연구)

  • Bae, Young-Kwon;Kho, Dae-Gon
    • Journal of The Korean Association of Information Education
    • /
    • v.12 no.3
    • /
    • pp.253-265
    • /
    • 2008
  • Recently the cyber home learning system is executed throughout the country as a part of educational policies to reduce expenditure on private education and to promote educational welfare for alienated classes. Thus, in order to examine the effectiveness of the cyber home learning system, we conducted an online questionnaire survey with elementary and secondary students, cyber teachers under the OO Office of Education. According to the results, overall satisfaction with the cyber home learning system and its effectiveness were found high. In addition, what were required for more effective the cyber home learning system were expanding the execution of unit school learning, strengthening teacher training, increasing incentives for cyber teachers, intensifying campaigns for the cyber home learning system, providing various types of information and contents of education, and activating learning activities such as community, message and chatting. This study is expected to be a steppingstone to the settlement of more effective the cyber home learning system.

  • PDF

Relationship among Self-Control, Physical Activity, Internet Addiction, Cyber Ethnics, and Cyber Delinquency (여성 청소년의 자기통제력, 운동참여수준, 인터넷 중독, 사이버윤리의식 및 사이버비행의 관계)

  • Park, Mi-Hyang;Park, Jae-Ahm
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.12
    • /
    • pp.7101-7109
    • /
    • 2014
  • This study examined the relationship among self-control, physical activity, Internet addiction, cyber ethnics, and cyber delinquency. The data from a total of 388 adolescent girls was analyzed by structural equation modeling using the AMOS 20.0 statistics program. First, the level of physical activity affects Internet addiction mediated by self-control. Second, self-control affects Internet addiction and cyber ethnics directly and has an influence on the cyber delinquency mediated by Internet addiction. Third, Internet addiction has direct effects both cyber delinquency and cyber ethnics.

A Study on the Concept of the Cyber Warfare and the Plan of Reaction (사이버전의 개념과 대응방안에 관한 연구)

  • Park, Chan-soo;Park, Yongsuk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.521-524
    • /
    • 2014
  • Because of the development of computers and networks, the use of the internet has been rapidly increased. The smart devices, such as smart phones and tablet PCs, have made an epoch-making changes, which have brought people's daily lives to the cyber world and life values have been improved. The cyber world not only just changed individual's lives, but also affected all areas and the world. The recent global trends reside mainly in protection of energy sources, and nation's dependency of the information system such as politic, economic and national security. Since major national infrastructure becomes a stragic attack target, the importance of cyber warfare has rised as an effective way to attact enermy. This article explores the concept of cyber warfare and national cyber capability, and then figure out the plan of reaction to minimize damages with best protection when cyber warfare occurs.

  • PDF