• Title/Summary/Keyword: cyberspace

Search Result 344, Processing Time 0.034 seconds

Authority of Image in Internet Space

  • Jang, Seo-Youn;Lim, Chan
    • International journal of advanced smart convergence
    • /
    • v.8 no.1
    • /
    • pp.153-158
    • /
    • 2019
  • Language and letter are represented by a combination of its signifier and signified. All symblos are commonly calling direct attention to people who are living in the physical world. However, in cyberspace, the image takes control once inhabited by the language. Cyberspace with anonymity and deoent physical nature has something with physical laws. In this space the statue transcends the imaginary realm. Ideology gives a greater connotation by giving a series of regulation to images floating in cyberspace. Even if various media have the same image, the meaning of the image changes depending on which ideology is used. The impact of this on the public is great. In this study, I discuss the ideology in cyberspace where is supposedly wide open to who visits and spreads all the thoughts without suppression and the human body. The main ideas would be who owns the ideology and what does it want to control and how the people would react to the ideology. This paper would eventually head the prototype that visualizes above ideas. Though the interactive media it will also show the subject in the real world is accept the images floating in the cyberspace without any doubts.

A study on the analysis of cyber warfare using Clausewitz's trinity theory (클라우제비츠의 삼위일체론을 통한 사이버공간 전쟁 해석 연구)

  • Lee, Hanhee;Kang, Ji-Won
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.41-47
    • /
    • 2018
  • Theorists of war have often used Clausewitz's trinity theory as a framework for analyzing war strategies and histories. Heretofore, studies on cyber warfare have focused primarily on laws, policies, structuring organizations, manpower, and training pertaining to preparing the cyberspace for war. Currently, studies highlighting the comparative characteristics of war in cyberspace, how it differs from conventional warfare, and analytical frameworks for understanding war in cyberspace are rare. Using Clausewitz's trinity theory, this paper interprets the essence of war from the perspectives of (1) Intellect, (2) Bravery, and (3) Passion, to propose an analytical model for understanding war in cyberspace, one that factors in the intrinsic qualities and characteristics of cyberspace under spatial and temporal constraints. Furthermore, this paper applies the aforementioned analytical model to the Iraq War and concludes with a theoretical illustration that cyber warfare played a significant role in winning the war.

  • PDF

A review of Chinese named entity recognition

  • Cheng, Jieren;Liu, Jingxin;Xu, Xinbin;Xia, Dongwan;Liu, Le;Sheng, Victor S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2012-2030
    • /
    • 2021
  • Named Entity Recognition (NER) is used to identify entity nouns in the corpus such as Location, Person and Organization, etc. NER is also an important basic of research in various natural language fields. The processing of Chinese NER has some unique difficulties, for example, there is no obvious segmentation boundary between each Chinese character in a Chinese sentence. The Chinese NER task is often combined with Chinese word segmentation, and so on. In response to these problems, we summarize the recognition methods of Chinese NER. In this review, we first introduce the sequence labeling system and evaluation metrics of NER. Then, we divide Chinese NER methods into rule-based methods, statistics-based machine learning methods and deep learning-based methods. Subsequently, we analyze in detail the model framework based on deep learning and the typical Chinese NER methods. Finally, we put forward the current challenges and future research directions of Chinese NER technology.

Generative Adversarial Networks: A Literature Review

  • Cheng, Jieren;Yang, Yue;Tang, Xiangyan;Xiong, Naixue;Zhang, Yuan;Lei, Feifei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4625-4647
    • /
    • 2020
  • The Generative Adversarial Networks, as one of the most creative deep learning models in recent years, has achieved great success in computer vision and natural language processing. It uses the game theory to generate the best sample in generator and discriminator. Recently, many deep learning models have been applied to the security field. Along with the idea of "generative" and "adversarial", researchers are trying to apply Generative Adversarial Networks to the security field. This paper presents the development of Generative Adversarial Networks. We review traditional generation models and typical Generative Adversarial Networks models, analyze the application of their models in natural language processing and computer vision. To emphasize that Generative Adversarial Networks models are feasible to be used in security, we separately review the contributions that their defenses in information security, cyber security and artificial intelligence security. Finally, drawing on the reviewed literature, we provide a broader outlook of this research direction.

Research on Covert Communication Technology Based on Matrix Decomposition of Digital Currency Transaction Amount

  • Lejun Zhang;Bo Zhang;Ran Guo;Zhujun Wang;Guopeng Wang;Jing Qiu;Shen Su;Yuan Liu;Guangxia Xu;Zhihong Tian;Sergey Gataullin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.1020-1041
    • /
    • 2024
  • With the development of covert communication technologies, the number of covert communication technologies using blockchain as a carrier is increasing. However, using the transaction amount of digital currency as a carrier for covert communication has problems such as low embedding rate, large consumption of transaction amount, and easy detection. In this paper, firstly, by experimentally analyzing the distribution of bitcoin transaction amounts, we determine the most suitable range of amounts for matrix decomposition. Secondly, we design a novel matrix decomposition method that can successfully decompose a large amount matrix into two small amount matrices and utilize the elements in the small amount matrices for covert communication. Finally, we analyze the feasibility of the novel matrix decomposition method in this scheme in detail from four aspects, and verify it by experimental comparison, which proves that our scheme not only improves the embedding rate and reduces the consumption of transaction amount, but also has a certain degree of resistance to detection.

A Study on Netiquette and Inappropriate Behavior in Cyberspace (사이버공간에서의 네티켓과 일탈행위에 관한 연구)

  • 조찬식
    • Journal of the Korean Society for information Management
    • /
    • v.18 no.2
    • /
    • pp.187-202
    • /
    • 2001
  • Given the lack of moral consciousness and increase of inappropriate behavior in cyberspace which is part of information society, more emphasis has been laid on netiquette. In this context, this study develops a theoretical background on netiquette, analyzes types of inappropriate behavior in cyberspace, and suggests some recommendations to settle down the sound cyber-culture and information society.

  • PDF

Face-to-face Communication in Cyberspace using Analysis and Synthesis of Facial Expression

  • Shigeo Morishima
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 1999.06a
    • /
    • pp.111-118
    • /
    • 1999
  • Recently computer can make cyberspace to walk through by an interactive virtual reality technique. An a avatar in cyberspace can bring us a virtual face-to-face communication environment. In this paper, an avatar is realized which has a real face in cyberspace and a multiuser communication system is constructed by voice transmitted through network. Voice from microphone is transmitted and analyzed, then mouth shape and facial expression of avatar are synchronously estimated and synthesized on real time. And also an entertainment application of a real-time voice driven synthetic face is introduced and this is an example of interactive movie. Finally, face motion capture system using physics based face model is introduced.

Empirical Analysis of Political Communication Mode at Cyberspace (사이버 공간에서의 정치 커뮤니케이션 양식 분석 연구 : 제16대 공선 후보자 사이버 게시판 분석을 중심으로)

  • Hwang, Geun
    • Korean journal of communication and information
    • /
    • v.16
    • /
    • pp.207-254
    • /
    • 2001
  • This study is focused on forecasting the future of tole-democracy. Many Scholars expect that internet provides technological space needing realizing the tole-democracy or deliberate democracy. Especially in Korea, this expectation is higher than other nations because of political corruption and inefficiency. Therefore internet is intended to considering as new technologies reforming political process. In 16th the general election period, many candidates established home page and used as election campaign tool. And a little of home pages is payed attention to among voters. In spite of using internet as political medium, many political communication researchers have a doubt that internet will realize ideal direct democracy. It's reason is that internet is open and anonymous space. At anonymous space, communication participators is tended to be irresponsible and non-serious. Therefore it is hard that cyber-politics will be ideal type of democracy. In this context, this paper analyzed how pauicipators communicate with others at cyber bulletin board establishing candidate's home pages. Main research questions is how do discussions at cyberspace fulfill the conditions of deliberate democracy. Therefore, concrete questions include; who are participators at candidate's cyber bulletin board; which pattern do they communicate; what is the theme of communication; which effects do the anonymous character of cyberspace influence. To that purpose, this study conducted content analysis on 4,210 written matters at 82 cyber bulletin boards of candidate's home page establishing during 16th the general election period. It can be found that cyberspace in Korea still is not deliberate democracy space and not will be. Firstly, discussion patterns at cyber bulletin board is "candidate with supporters communication space. To be exact, it is said that candidate's home page is "the space of self-convincing among supporters." Secondly, the main themes of discussion are simple emotional expressions; "I support you!" "fighting" "Be vigor" etc. By contrast, real political contents'-central or local political matters - is relatively few. In the mode of expression, real political messages are more positive, logical than simple expressions, candidates private matters. Especially this characteristic will make cyberspace as "mutual slander space" consolidating anonymous characteristic of cyberspace. finally, Cyberspace in Korea still is not real "public sphere" realizing deliberate process. Therefore to be real public sphere, it is needed to participant's ethical maturity and political citizenship. In conclusion, it is difficult that cyberspace will reconstruct the Athene's Agora. On the contrary, Cyberagora will like to be irrespectable area fulfilling the sweeping. Making the deliberate space, technological possibility and ethical condition will have to be balanced together.

  • PDF

Control measures in Cyberspace in the light of Rimland theory (림랜드 이론으로 본 사이버공간 통제방안 (북한의 사이버전 사례연구를 중심으로))

  • Dong-hyun Kim;Soo-jin Lee;Wan-ju Kim;Jae Sung Lim
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.11-16
    • /
    • 2022
  • Development of science technology make integrated CPS(Cyber-Physical System) appear. In CPS era, cyberspace and physical-space are hard to separate anymore, that is developing toward integrated CPS. The reality is not stopping, that is consistently changing and the concept of space is developing too. But several articles are considering for cyberspace and physical-space separately, and they are developing tailed alternative each case. The theorical approaching that is not considering reality is dwelled on past, and is dangerous from dropping down to floating cloud that is not considering progressed reality. This article is suggested to consider rimland theory to control measures in cyberspace. That is dedicated to integrated approaching from physical-space to cyberspace. And that is developing concreted controling measures in cyberspace. Especially, this article is suggested to policy alternative by analyzing north korea cyber warfare from rimland theory including human sources. Simplicity is the ultimate sophistication. This article make integrated approaching effects about cyberspace and physical-space to preparing in the CPS era.