• Title/Summary/Keyword: cyberspace

Search Result 348, Processing Time 0.024 seconds

Examining the Impact of Online Friendship Desire on Citizenship Behavior (온라인 환경에서 친교욕구가 시민행동에 끼치는 영향)

  • Jang, Yoon-Jung;Lee, So-Hyun;Kim, Hee-Woong
    • Asia pacific journal of information systems
    • /
    • v.23 no.4
    • /
    • pp.29-51
    • /
    • 2013
  • In line with network technology development and smart device penetration, the social network service (SNS) has expanded its influence. The SNS which is a service based on communication and sharing among people, has grown based on users' voluntary engagement and participation and its influence has appeared beyond the cyberspace into the overall areas of domestic and foreign culture and society. In particular, SNS-based real-time communication during diverse disasters, can help prevent further damage. By sharing information on social donation activities and environmental campaigns, people have used SNS as a tool to change the society in a more positive way. Such series of activities functioning as a power to change the society have been made much faster and wider through the help of a new media called SNS. To better understand such trends, we are required to study about the SNS and its user relationships first. In this context, this study sought to identify the effects of people's desire to build friendships through SNS on the voluntary and society-friendly activities of people. This study considers online pro-social behavior and proposes online citizenship behavior. Citizenship behavior has been examined in organization context. That is, organizational citizenship behavior explains an employee's pro-social behavior in an organization context. Organizational citizenship behavior is characterized by the individual's helping others and promoting the functioning of the organization. By applying organizational citizenship behavior to an online context, we propose online citizenship behavior, an individual's pro-social behavior in an online context. An individual's pro-social behavior, i.e., online citizenship behavior, could be considered as a way for the better management of online community and society. It also needs to examine the development of online citizenship behavior. This study examined online citizenship behavior from the friendship desire. Because online society or community is characterized by online relationships between members, the friendship between members would lead to pro-social behavior, i.e., helping others and promoting the functioning of the online society, in such online context. This study further examines the antecedents of friendship desire in terms of SNS interactivity with its four factors. The findings based on the survey from real SNS users explain that the three factors of SNS interactivity (connectivity, enjoyment, and synchronicity) increases online friendship desire which then increases online citizenship behavior significantly. This study contributes to the literature by examining the key role of online friendship desire in leading to online citizenship behavior and identifying its antecedents in terms of SNS characteristics. The findings in this study also provide guidance on how to manage online society and how to promote the effective functioning of SNS.

Exploring the Differences between Adolescents' and Parents' Ratings on Adolescents' Smartphone Addiction

  • Youn, HyunChul;Lee, Soyoung Irene;Lee, So Hee;Kim, Ji-Youn;Kim, Ji-Hoon;Park, Eun Jin;Park, June Sung;Bhang, Soo-Young;Lee, Moon-Soo;Lee, Yeon Jung;Choi, Sang-Cheol;Choi, Tae Young;Lee, A-Reum;Kim, Dae-Jin
    • Journal of Korean Medical Science
    • /
    • v.33 no.52
    • /
    • pp.347.1-347.11
    • /
    • 2018
  • Background: Smartphone addiction has recently been highlighted as a major health issue among adolescents. In this study, we assessed the degree of agreement between adolescents' and parents' ratings of adolescents' smartphone addiction. Additionally, we evaluated the psychosocial factors associated with adolescents' and parents' ratings of adolescents' smartphone addiction. Methods: In total, 158 adolescents aged 12-19 years and their parents participated in this study. The adolescents completed the Smartphone Addiction Scale (SAS) and the Isolated Peer Relationship Inventory (IPRI). Their parents also completed the SAS (about their adolescents), SAS-Short Version (SAS-SV; about themselves), Generalized Anxiety Disorder-7 (GAD-7), and Patient Health Questionnaire-9 (PHQ-9). We used the paired t-test, McNemar test, and Pearson's correlation analyses. Results: Percentage of risk users was higher in parents' ratings of adolescents' smartphone addiction than ratings of adolescents themselves. There was disagreement between the SAS and SAS-parent report total scores and subscale scores on positive anticipation, withdrawal, and cyberspace-oriented relationship. SAS scores were positively associated with average minutes of weekday/holiday smartphone use and scores on the IPRI and father's GAD-7 and PHQ-9 scores. Additionally, SAS-parent report scores showed positive associations with average minutes of weekday/holiday smartphone use and each parent's SAS-SV, GAD-7, and PHQ-9 scores. Conclusion: The results suggest that clinicians need to consider both adolescents' and parents' reports when assessing adolescents' smartphone addiction, and be aware of the possibility of under- or overestimation. Our results cannot only be a reference in assessing adolescents' smartphone addiction, but also provide inspiration for future studies.

The Correlation Between Smartphone Addiction and Sensory Processing Feature Depending on Gender in College Students (작업치료전공 대학생의 성별에 따른 스마트폰 중독과 감각처리와의 관련성)

  • Hong, Eunkyoung;Lee, Hyerim
    • The Journal of Korean Academy of Sensory Integration
    • /
    • v.16 no.3
    • /
    • pp.1-10
    • /
    • 2018
  • Objective : The purpose of this study was to investigate smartphone addition and sensory processing character depend on gender for occupational therapy (OT) students, and to identify the correlation between smartphone addiction and sensory processing feature. Methods : Participants of this study were 168 (70 male/90 female) students majoring occupational therapy. Measurements in this study were a questionnaire about general information of subject, smartphone addiction scale, and adult/adolescent sensory profile. Data collection period was from November 2017 to March 2018. Methods for the data analysis included descriptive statistics, independent t-test and Pearson correlation of SPSS 22.0. Results : In term of the purpose of using smartphone, majority response was communication and gaming ranked in next. There were difference between male and female in the total smartphone addition, cyberspace-oriented relationship, withdrawal and tolerance. The result showed that all sensory processing are related with total smartphone addition (r = .236 ~ .603) for man. And for women, total smartphone addition is little related with the taste/smell processing (r= .290), visual processing (r= .324), touch processing (r= .214), low registration (r= .214), sensory sensitivity (r= .243), and sensory avoiding (r= .217). Conclusion : This study found that there is difference between male and female in terms of relation between smartphone addition and sensory processing feature according for occupational therapy students.

Current Trends in the U.S. Cybersecurity Laws (미국 사이버보안법의 최근 동향 - 「사이버보안 정보공유법」을 중심으로 하여 -)

  • Yang, Chun-Soo;Jee, Yu-Mi
    • Journal of Legislation Research
    • /
    • no.54
    • /
    • pp.155-192
    • /
    • 2018
  • As the 'hyper-connected society' has emerged through the 'Fourth Industrial Revolution, public interests as well as social dangers have increased. Above all, the risk of infringement of information, including confidential personal information, is dramatically increasing. As the hyper-connected society has been realized, even if only one of the internet devices is hacked, there would be a danger that the ripple effect of such a hacking spreads to the whole network. Therefore, the necessity and importance of information security, including cybersecurity, has been increasing. In other words, the stability of cyberspace and internet space is becoming more important. As a result, the Korean government is seeking to build a legal system related to information security, which would be able to cope with the information infringement problem in the hyper-connected society. However, it seems that the government is still struggling with the direction of building such a legal system. In this context, a comparative review examining the legal systems of advanced foreign countries will provide meaningful implications as to what kinds of legal policies we should devise and implement for information security. In particular, the U.S. legislative act that actively responds to the cybersecurity violations is worthy of reference. For this reason, this article systematically analyzes the current status of the U.S. cybersecurity laws. Especially, this article focuses on the "Cybersecurity Information Sharing Act of 2015"(hereinafter "CISA"), that was recently enacted by the U.S. congress. The CISA prescribes the systemic and detailed information-sharing between national and private entities. The CISA, that actively promotes information-sharing, is full of suggestions for us, in that information-sharing is an effective way to properly realize information security in today's hyper-connected society.

A Study on the Policy Measures for the Prevention of Industrial Secret Leakage in the Metaverse (메타버스 내 산업기밀 유출 대응을 위한 정책 및 제도에 관한 연구)

  • Jeon, So-Eun;Oh, Ye-Sol;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.377-388
    • /
    • 2022
  • Metaverse, realistic virtual space technology has become a hot topic. However, due to the lack of an institutional system to the metaverse environment, concerns are rising over the leakage of industrial confidentiality, including digital assets produced, stored, processed, and transferred within the metaverse. Digital forensics, a technology to defend against hacking attacks in cyberspace, cannot be used in metaverse space, and there is no basis for calculating the extent of damage and tracking responsibility, making it difficult to respond to human resources leakage and cyberhacking effectively. In this paper, we define the scope of industrial confidentiality information and leakage scenario and propose policy and institutional measures based on problems in each metaverse scenario. As a result of the study, it was necessary to prepare a standardized law on Extra-territorial search and seizure issues and a system for collecting cryptocurrency evidence to respond to industrial confidentiality leaks in the metaverse. The study expects to contribute to industrial technology development by preparing in advance for problems that may arise in metaverse technology.

A Study on Non-Fungible Token Platform for Usability and Privacy Improvement (사용성 및 프라이버시 개선을 위한 NFT 플랫폼 연구)

  • Kang, Myung Joe;Kim, Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.11
    • /
    • pp.403-410
    • /
    • 2022
  • Non-Fungible Tokens (NFTs) created on the basis of blockchain have their own unique value, so they cannot be forged or exchanged with other tokens or coins. Using these characteristics, NFTs can be issued to digital assets such as images, videos, artworks, game characters, and items to claim ownership of digital assets among many users and objects in cyberspace, as well as proving the original. However, interest in NFTs exploded from the beginning of 2020, causing a lot of load on the blockchain network, and as a result, users are experiencing problems such as delays in computational processing or very large fees in the mining process. Additionally, all actions of users are stored in the blockchain, and digital assets are stored in a blockchain-based distributed file storage system, which may unnecessarily expose the personal information of users who do not want to identify themselves on the Internet. In this paper, we propose an NFT platform using cloud computing, access gate, conversion table, and cloud ID to improve usability and privacy problems that occur in existing system. For performance comparison between local and cloud systems, we measured the gas used for smart contract deployment and NFT-issued transaction. As a result, even though the cloud system used the same experimental environment and parameters, it saved about 3.75% of gas for smart contract deployment and about 4.6% for NFT-generated transaction, confirming that the cloud system can handle computations more efficiently than the local system.

A Redesign of the Military Education Structure of General Universities based on Defense Innovation 4.0 -Focused on Capabilities of Tech-Intensive Junior Officers based on Advanced S&T- (국방혁신4.0 기반의 일반대학의 군사학 교육체계 재설계 방안 -첨단과학기술 기반의 기술집약형 초급 간부 역량 중심으로-)

  • Jung-Ho Eom;Keun-Seog Park;Sang-Pil Chun
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.35-44
    • /
    • 2022
  • Among the five promotion strategies of Defense Innovation 4.0(DI 4.0), the military structure/operation optimization strategy aims to innovate the military structure based on advanced science&technology(S&T), and to integrate advanced S&T in the field of defense operation such as education&training and human resource development. As the future battlefield expands to AI-based unmanned/robot combat systems, space, cyberspace, and electromagnetic fields, it is necessary to train officers with the capabilities required in these battlefields. It is necessary to develop capabilities from junior officers who will lead the future battlefield to operating core advanced power based on the 4th industrial revolution S&T. We review the education system of the military in universities and propose a method of redesigning the education system that is compatible with DI 4.0 and can develop technology-intensive capabilities based on advanced S&T. We propose a operation plan of major and extra-programs that can develop the capabilities of junior officers required for the future battlefield, and also suggest ways to support the army's practical training.

The Roles of Self-Expression and Identification on the Personal Community Commitment (개인 커뮤니티 몰입에 대한 자아표현 및 동일시의 역할)

  • Choi, Nak Hwan;Lee, Chang Won
    • Asia Marketing Journal
    • /
    • v.9 no.3
    • /
    • pp.117-149
    • /
    • 2007
  • It can be explained by congruity theory as a process that consumers engage in a matching process to identify personal community that is congruent with their self-images to find the identification between the self and the personal community. Personal community cues that evoke certain images are viewed as activating similar beliefs about the self (e.g., high status). Individuals prompt a comparison process to determine whether the personal community and self-image are congruent and imagine prototypical users of the personal community and select ones that maximize similarity to their actual or desired self-concept. Identity is devided into personal identity and social identity. Consumers are likely to be influenced by both personal identity and social identity. In this article the influencing factors of the commitment to on-line personal community are explored by the sources of both personal identification and social identification. The results are as follows. The maintenance expression and enhancement expression of personal self influence the level of personal identification positively and the maintenance expression and enhancement expression of social self influence the level of social identification positively. The level of both social and personal identification positively influence the commitment to on-line personal community which gives positive responses to the source enterprise that allows the cyberspace and the other benefits to be used.

  • PDF

Integrated Scenario Authoring Method using Mission Impact Analysis Tool due to Cyber Attacks (사이버공격에 의한 임무영향 분석 도구를 이용한 통합시나리오 저작 방법)

  • Yonghyun Kim;Donghwa Kim;Donghwan Lee;Juyoub Kim;Myung Kil Ahn
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.107-117
    • /
    • 2023
  • It must be possible to assess how combat actions taking place in cyberspace affect the military's major mission systems and weapon systems. In order to analyze the mission impact caused by a cyber attack through cyber M&S, the target mission system and cyber warfare elements must be built as a model and a scenario for simulation must be authored. Many studies related to mission impact analysis due to cyber warfare have been conducted focusing on the United States, and existing studies have authored separate scenarios for physical battlefields and cyber battlefields. It is necessary to build a simulation environment that combines a physical battlefield model and a cyber battlefield model, and be able to integrate and author mission scenarios and cyber attack/defense scenarios. In addition, the physical battlefield and cyber battlefield are different work areas, so authoring two types of scenarios for simulation is very complicated and time-consuming. In this paper, we propose a method of using mission system information to prepare the data needed for scenario authoring in advance and using the pre-worked data to author an integrated scenario. The proposed method is being developed by reflecting it in the design of the scenario authoring tool, and an integrated scenario authoring in the field of counter-fire warfare is being performed to prove the proposed method. In the future, by using a scenario authoring tool that reflects the proposed method, it will be possible to easily author an integrated scenario for mission impact analysis in a short period of time.

Exploring the Nature of Cybercrime and Countermeasures: Focusing on Copyright Infringement, Gambling, and Pornography Crimes (사이버 범죄의 특성과 대응방안 연구: 저작권 침해, 도박, 음란물 범죄를 중심으로)

  • Ilwoong Kang;Jaehui Kim;So-Hyun Lee;Hee-Woong Kim
    • Knowledge Management Research
    • /
    • v.25 no.2
    • /
    • pp.69-94
    • /
    • 2024
  • With the development of cyberspace and its increasing interaction with our daily lives, cybercrime has been steadily increasing in recent years and has become more prominent as a serious social problem. Notably, the "four major malicious cybercrimes" - cyber fraud, cyber financial crime, cyber sexual violence, and cyber gambling - have drawn significant attention. In order to minimize the damage of cybercrime, it's crucial to delve into the specifics of each crime and develop targeted prevention and intervention strategies. Yet, most existing research relies on indirect data sources like statistics, victim testimonials, and public opinion. This study seeks to uncover the characteristics and factors of cybercrime by directly interviewing suspects involved in 'copyright infringement', 'gambling' related to illicit online content, and 'pornography crime'. Through coding analysis and text mining, the study aims to offer a more in-depth understanding of cybercrime dynamics. Furthermore, by suggesting preventative and remedial measures, the research aims to equip policymakers with vital information to reduce the repercussions of this escalating digital threat.