• Title/Summary/Keyword: south korea cyber environment

Search Result 13, Processing Time 0.031 seconds

The threats and responses of cyber-terrorism in a new security environment: Issues and propositions on strategic frameworks (새로운 안보환경을 둘러싼 사이버 테러의 위협과 대응방안: 쟁점들과 전략적 접근 틀에 대한 논의)

  • Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.109-145
    • /
    • 2014
  • Despite much discussions on cyber-terrorism in South Korea, several missing issues could be addressed. This paper attempts to deal with such missing but important issues. In South Korea, there has been little attentions on cyber-terrorism with the respects of national security strategy development under macro framework responding to future security environment. This article focuses on such issues. In other words, the purpose of this paper evaluates the meaning of national security threats raised from cyber-terrorism as a mode of security threats and proposes the matter of cyber-terrorism within the development of national security strategy in the future security environment. several issues in this discussion pass some important messages for the construction of national security strategic approach framework within the future security environment adding cyber-space. in the future environment, a new space called cyber is added as an important external condition which might determine the security of individuals, societies, and nations. Therefore, the fundamental strategic framework should be prepared. After that, the trend and direction of future technological advancement should be understood and the identity, nature, and types of threat should be analyzed. Also, after that, various responses and countermeasures are together constituted in the aspect of function and system regarding various anticipated threats of the future human society including cyber-terrorism.

  • PDF

Improvement of Computer Security Check Program and User Inspection Items In Response To Military Cyber Security Breachment(For Army sector) (국방 사이버 침해 대응을 위한 전산보안점검 프로그램 및 사용자 진단항목 개선 연구(육군 중심))

  • Kim, Jee Won;Jung, Ui Seob;Jung, Chan Gi
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.101-107
    • /
    • 2017
  • Recent cyber attacks on South Korea, including hacking and viruses, are increasing significantly. To deal with the cyber invasion of cyber aggression, the Ministry of National Defense defined the necessary procedures for cyber security with guidelines for cyber security. In spite of, based on the analyses the cyber defense operations published, the number of violations are increasing. To address issues stated above, the safety check items should be reviewed and revised. This paper will revisit current safety check items and provide new guidelines to prevent cyber security breaches, which will provide more safe and efficient cyber environment.

Meta-analysis for Exploring Predictors of Cyberbullying Perpetration among Youth in South Korea (청소년 사이버불링 가해행동 예측요인 탐색을 위한 국내연구 메타분석)

  • Kim, Shinah;Bang, Eunhye;Han, Yoonsun
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.5
    • /
    • pp.18-33
    • /
    • 2017
  • The purpose of this study was to examine the effect sizes of personal, family, peer, school, cyber environment, experience of bullying/victimization factors on cyberbullying perpetrating behavior among students in Korea using meta-analysis. Published academic journals and master/doctoral dissertations from 2010.01.01 to 2016.10.31 were identified using Research Information Sharing Service(RISS) data base. Keywords for search were cyberbullying, cyber-exclusion, cyber-violence, cyber-harassment, online/SNS peer harassment. A total of 43 studies were selected for meta-analysis. Personal factors and experience of bullying/victimization showed moderate effect sizes(0.28~0.29) and peer, family, cyber environment, school domains showed small effect sizes(0.08~0.13). Results of the study may be used to guide effective prevention or intervention strategies against cyberbullying among adolescents.

A strategic Approach for Establishing Korea's Cyber Terrorism Policy : Focusing on the UK's cyber terrorism policy (국내 사이버테러 정책수립을 위한 전략적 접근방안 : 영국의 사이버테러 정책을 중심으로)

  • Kim, Byung-Hwa
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.173-195
    • /
    • 2017
  • Recently, in South Korea, security management has been strengthened, but there have been an increasing number of cases where the main infrastructure of the country is hacked in the cyber space. South Korea is equipped with sophisticated information and communication technologies, such as Internet, but is threatened by cyber terrorism of North Korea and terrorist organizations. Nevertheless, there is a limit to how to develop a policy and strategic plan for the country, which is related to domestic terrorism and lacks legal and regulatory facilities, and therefore, in this study, proposed suggestions for building adaptive and efficient policy formulation. Based on the theoretical analysis framework of the Strategic Plan for achieving the objectives of the research, we compared the UK 's security strategy with the national security policy of the domestic government. As a result, several problems were derived: First, the domestic security strategy did not take into account the external environment. Secondly, lack of coordination with domestic cyber security goals setting and strategy is causing ambiguity and confusion. Third, the detailed plan of implementation of national security in each province is designed to ensure that there is a possibility that a mixed side effect between ministries and agencies will arise. Fourth, it was found that there was a limit to prepare the evaluation standards for the evaluation and return of domestic security policies in the country. Therefore, in order to establish a policy for the response of domestic cyber terrorism, we set up a vision from long-term perspectives and concrete targets based on the strategic approach of the security policy, It is necessary to present an assignment and formulate an efficient execution plan. It is necessary to maintain and improve the domestic safeguards in order to be able to complement the problems through evaluation and feedback.

  • PDF

The Effect of Users' Individual characteristics and Social Influence on Cyberethics and Usage in Web 2.0 - Comparing South Korea and U.S.A. - (웹 2.0 환경에서 사용자의 개인특성과 사회적 영향이 사이버윤리성과 사용성에 미치는 영향 - 한국과 미국의 비교연구 -)

  • Moon, Yun-Ji
    • Management & Information Systems Review
    • /
    • v.33 no.2
    • /
    • pp.101-118
    • /
    • 2014
  • In the mid-2000s, Web 2.0 appears and is becoming a general cultural code with the keyword of participation, sharing, and openness. Web 2.0, in which consumption is being transformed by the participatory web culture, has evolved. However, associated with the evolution of Web 2.0, several significant concerns appears in a society. Among them, this study will focuses on the cyber-ethics issues. There are limitations to solve the cyber-ethics problems only in the technical and legal approaches. Therefore, the current article intends to consider comprehensively the antecedents of cyber-ethics such as individual characteristics, social influence, and cultural characteristics. Specifically, (1) Do individual characteristics(i.e., self-efficacy, locus of control) affect cyber-ethics in the Web 2.0 environment?, (2) Do social influence(i.e., subjective norm) have an effect on cyber-ethics?, (3) Do cyber -ethics have an impact on user participation in the Web 2.0 services(i.e., retrieval and creation)?, finally (4) Do international cultural difference have a moderation effect on the relationship between cyber-ethics and user participation? For testing empirically the hypothesized research model, this study collected questionnaires in South Korea as well as U.S.A. The results showed that individual characteristics and social influence affect cyber-ethics toward user's creative activities in Web 2.0 sites.

  • PDF

Development of Educational Software using ICT in Environmental Education (ICT를 활용한 환경교육용 소프트웨어 개발 방안과 사례)

  • Kim Dae-Hee;Heo, Hee-Ok
    • Hwankyungkyoyuk
    • /
    • v.17 no.1
    • /
    • pp.43-56
    • /
    • 2004
  • The purpose of environmental education is to cultivate democracy citizens suitable for sustainable society. Suitable citizens for sustainable society are fostered person of environmental literacy, environmental sensibility, ecological and synthetic sights of environmental problems, decision making of environmental problems, and environmental responsibility etc. by environmental education. To achieve this purpose of environmental education effectively, it is desirable that produces and utilizes ICT(Information and Communication Technologies) works and methods that can show efficiently special sides(inter-relation, long-term effects etc.) of environmental problems. ICT environmental education materials and methods are raising the interest and participate of teenagers to environmental education because they are accustomed to the Internet in South Korea. Students can easily conversation with the person of similar interests and environment experts through cyber ICT environmental education. The directions of developing ICT teaching materials for environmental education to enforce self-directed learning, cooperation studying etc.

  • PDF

Rationalization of Network Segregation for Continuity of Financial Services Following COVID-19

  • Choi, Manyong;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4163-4183
    • /
    • 2021
  • As measures for protecting users and ensuring security of electronic financial transactions, such as online banking, financial institutions in South Korea have implemented network segregation policies. However, a revision of such domain-centered standardized network segregation policies has been increasingly requested because of: 1) increased demand for remote work due to changes resulting from COVID-19 pandemic; and 2) the difficulty of applying new technologies of fintech companies based on information and communications technologies (ICTs) such as cloud services. Therefore, in this study, problems of the remote work environment arising from the network segregation policy currently applied to the financial sector in South Korea and those from the application of new ICTs such as fintech technology have been investigated. In addition, internal network protection policies of foreign financial sectors, such as those of the United States, United Kingdom, European Union, and Russia, and internal network protection policies of non-financial sectors, such as control systems, have been analyzed. As measures for the effective improvement of the current network segregation policy, we propose a policy change from domain-based to data-centric network segregation. Furthermore, to resolve threats of hacking at remote work, recently emerging as a global problem due to COVID-19 pandemic, a standard model for remote work system development applicable to financial companies and a reinforced terminal security model are presented, and an alternative control method applicable when network segregation is not applied is proposed.

Unsupervised Learning-Based Threat Detection System Using Radio Frequency Signal Characteristic Data (무선 주파수 신호 특성 데이터를 사용한 비지도 학습 기반의 위협 탐지 시스템)

  • Dae-kyeong Park;Woo-jin Lee;Byeong-jin Kim;Jae-yeon Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.147-155
    • /
    • 2024
  • Currently, the 4th Industrial Revolution, like other revolutions, is bringing great change and new life to humanity, and in particular, the demand for and use of drones, which can be applied by combining various technologies such as big data, artificial intelligence, and information and communications technology, is increasing. Recently, it has been widely used to carry out dangerous military operations and missions, such as the Russia-Ukraine war and North Korea's reconnaissance against South Korea, and as the demand for and use of drones increases, concerns about the safety and security of drones are growing. Currently, a variety of research is being conducted, such as detection of wireless communication abnormalities and sensor data abnormalities related to drones, but research on real-time detection of threats using radio frequency characteristic data is insufficient. Therefore, in this paper, we conduct a study to determine whether the characteristic data is normal or abnormal signal data by collecting radio frequency signal characteristic data generated while the drone communicates with the ground control system while performing a mission in a HITL(Hardware In The Loop) simulation environment similar to the real environment. proceeded. In addition, we propose an unsupervised learning-based threat detection system and optimal threshold that can detect threat signals in real time while a drone is performing a mission.

A Geographical Study on Characteristics of Political Activities in Cyberspace and Interrelationship between Online and Offline: A case of South Korea's Presidential Election in 2012 (가상공간에서의 정치 활동의 특징과 오프라인 환경과의 연계성에 대한 지리적 고찰: 2012년 대통령 선거를 사례로)

  • Park, Sookyung
    • Journal of the Korean Geographical Society
    • /
    • v.48 no.5
    • /
    • pp.686-708
    • /
    • 2013
  • The goal of this investigation is to examine the matter as to how various cyberpolitical activities such as on-line civic participation, cyber parties, development and movement of civil society networks are appeared in cyberspace; and how political activities in cyberspace are associated with offline environment. This research was based on in-depth and open-ended interviews centering around 20s (32 interviewees) and the major results are as in the following. First, in terms of on-line civic participation, searching political issues occur in places, where internet users can access information easily relatively, and creating or reconstructing political information is identified in places giving stability or affinity to the public society. Second, even though each party's homepage for the channel of cyber parties has enough capacity as bridgespace, which takes charge of supporting f lows of people, goods, capital, and ideas, most of them don't play a role to establish virtual or real networks. Exceptively, cyber parties contribute to make temporalized places, where nobody takes the responsibility, somewhat. Third, the development and movement of civil society networks is divided into several segments according to political interests and tendency in online; furthermore, such a cyberpolitical activity influences human networks and the decision of major places for political activities in offline.

  • PDF

Related Factors of Handwashing with Soap and its Practices by Students in South Korea (우리나라 초·중·고등학교 학생의 비누로 손씻기 실천 및 관련요인)

  • Yang, Nam Young;Lee, Moo-Sik;Hwang, Hae-Jung;Hong, Jee-Young;Kim, Byung-Hee;Kim, Hyun-Soo;Hong, Su-Jin;Kim, Eun-Young;Kim, Young-Teak;Park, Yun-Jin
    • Journal of Korean Public Health Nursing
    • /
    • v.28 no.2
    • /
    • pp.372-386
    • /
    • 2014
  • Purpose: This study was conducted in order to prove related practice factors of handwashing with soap and its practices by students in South Korea. Method: The subjects consisted of 700 students. Data were collected in Sep 2013 and were analyzed using descriptive statistics, chi-square test, and logistic regression analysis. Results: Total number of handwashing times was 7.5 per day. 65.1% of the students used soap and most of the students washed their hands for 20 seconds(31.1%). Self-evaluation, awareness of effect for prevention of infectious disease, and need for handwashing education were positive, but evaluation of toilet environment was negative. Most of the students washed their hands for 21 seconds(%), and methods of handwashing were not appropriate. Level of awareness was over 85% in most items. Practice differed significantly according to locations, pattern of school, self-evaluation, awareness of effect for prevention of infectious disease, need for education handwashing, and toilet environment. Conclusion: These findings indicate that the students learned methods of handwashing for its practice in South Korea, and they were considered as general characteristics of handwashing from students. In addition, results mentioned above will be reflected in development of educational programs for improvement of handwashing efficiency.