• Title/Summary/Keyword: 사이버 사회

Search Result 705, Processing Time 0.023 seconds

Countermeasure by Cyber Infringement Accident Present Condition Analysis of Public and Private Section (공공 및 민간부문의 사이버침해사고 현황분석에 따른 대응방안)

  • Cho, Ho-Dae;Shin, Dong-Il
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.331-338
    • /
    • 2009
  • We live was operates the life which is the Internet and became infra is very important. In order minimizes like this disfunction from will be applied the new order must take a position in cyber space. The cyber infringement most the information society brings about is serious concern middle one. The biggest thing is anonymous characteristic with cause of cyber crime. Also well cannot know becomes the cause where commits a crime that about cyber crime. Cyber crime the guilty conscience is thin. And the criminal who commits a cyber crime sense of insecurity is few. This paper which sees cyber infringement accident dividing came in public section, and analyzed presented a present condition and a confrontation plan.

Apple의 사이드로딩 허용이 사이버 보안에 미치는 영향

  • Wonsuk Choi;Dong Hoon Lee
    • Review of KIISC
    • /
    • v.33 no.1
    • /
    • pp.65-76
    • /
    • 2023
  • 스마트폰 환경에서 사이드로딩 이란, 플랫폼 사업자의 심사 및 승인없이 앱을 스마트폰에 설치하는 것을 의미한다. 즉, 공식적인 앱 마켓을 통하지 않고 제3의 앱마켓 또는 인터넷에서 설치파일을 직접 다운로드하여 설치하는 과정을 말한다. 여기서 제3의 앱마켓이란 플랫폼 사업자가 공식적으로 관리하는 앱 스토어를 제외한 모든 앱 마켓을 의미한다. 본고에서는 사이버 보안 관점에서 제3의 앱마켓 및 사이드로딩 허용여부로 인해 발생하는 사회적 문제점을 고찰하고자한다. 특히, 제3의 앱마켓 및 사이드로딩을 제도적으로 허용하고 있는 안드로이드 환경에서 발생하고 있는 사회적 문제점들을 바탕으로 iOS 환경에서도 제3의 앱마켓 및 사이드로딩이 허용되는 경우, 사이버 보안 관점에서 예상되는 사회적 문제점들을 알아보고자 한다.

A Study on the Development of Cyberpolice Volunteer System Using the Collective Intellectual Network (집단지성 네트워크형 사이버폴리스 자원봉사시스템 구축에 관한 연구)

  • Kim, Doo-Hyun;Park, Sung-Joon;Na, Gi-Sung
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.59-85
    • /
    • 2019
  • In the reality that the boundary between the real world and the virtual world disappears with the 4th Industrial Revolution, cyber crimes that occur beyond time and space have clear limitations in fulfilling their duties only with the police force of government organizations established under the real law system. The research method of this thesis is based on the literature research and the experience of security work. The purpose of this paper is to establish a social system where collective intelligence of each social field can participate voluntarily to respond to cyber crimes occurring beyond the time and space before the law and institutionalization. In addition, the social system in which collective intelligence in each social sector can participate voluntarily was established to define crime types in cyberspace in real time and to prevent crimes defined by the people themselves and the counter-measures had been proposed in order to form social consensus. First, it is necessary to establish a collective intelligent network-type cyberpolice volunteer system. The organization consists of professors of security and security related departments at universities nationwide, retired public officials from the National Intelligence Service, the National Police Agency, and the National Emergency Management Agency, security companies and the organizations, civilian investigators, security & guard, firefighting, police, transportation, intelligence, security, national security, and research experts. Second, private sector regulation should be established newly under the Security Business Act. Third, the safety guard of the collective intelligent cyberpolice volunteer system for the stability of the people's lives should strengthen volunteer work. Fourth, research lessons and legal countermeasures against cybercrime in advanced countries should be introduced. Fifth, the Act on the Protection of Personal Information, the Act on Promotion of Information and Communication Network Utilization and Information Protection, the Act on the Utilization and Protection of Credit Information, and the Special Act on the Materials and Parts Industry should be amended. Sixth, police officers should develop cybercrime awareness skills for proactive prevention activities.

개인정보보호기술과 정보보호산업 동향

  • Jeong, Sang-Ho
    • 정보화사회
    • /
    • s.168
    • /
    • pp.12-16
    • /
    • 2004
  • 정보보호기술은 사이버 공간을 통한 정보침해의 양상이 다양화.지능화되고, 새로운 정보통신서비스가 등장함에 따라 기술 발전도 더욱 가속화될 전망이다. 이제 사이버상의 범죄 예방 및 국가차원의 정보보호를 제고하기 위하여 정보보호산업의 육성은 매우 시급한 실정이다.

  • PDF

The Effects of Personal, Institutional, Social Variables on Determination of The Cyber University Students' Dropout Intention (개인, 교육기관, 사회적 변인이 사이버대 재학생의 중도탈락의도 결정에 미치는 영향)

  • Kwon, Hye-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.404-412
    • /
    • 2010
  • The purpose of this study is to suggest the basic data for lowering cyber university students' dropout rate and fostering continuous learning environment through understanding that cyber university student's private variance, an education institute variance and social variance have the impact on a student's determining dropout. For this, we selected students in A cyber university and carried out surveys for 500 students from April first to May 31st, 2009 using convenience sampling. We excluded answers whose results are considered to be insufficient or overlapped among answers of 336 students and used 304 answers in this study. We carried out logistics regression analysis using SPSS for Winow 15.0 for data analysis. First, it proved that individual interest variance affects the dropout. Second, it turned out that educational institute's environment variance has impact on the dropout. Third, it proved that social environment factor affects the dropout. Fourth, only individual variance among individual, an educational institute and social variance has meaningful impact on the dropout in terms of statistics.

An influence of a Sense of Classroom Community and Social Presence on Learning Satisfaction in a Cyber Learning Setting (사이버학습환경에서 학급공동체의식과 사회적 실재감이 학습만족도에 미치는 영향)

  • Kim, Jeong-Kyoum;Cho, Hye-Rung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.8
    • /
    • pp.3436-3443
    • /
    • 2012
  • The purpose of this study was to examine the impact of a sense of classroom community and social presence on learning satisfaction in a cyber learning setting. The subjects in this study were 172 sixth graders in M elementary school in the city of D, who studied in a cyber setting at home. A survey was conducted to gather data, and multiple regression analysis were carried out to determine the influence of a sense of classroom community and social presence on learning satisfaction. As a result, it is found that a sense of classroom community and social presence had a significant correlation to learning satisfaction. A sense of classroom community turned out to affect learning satisfaction. A sense of classroom community are a major variable that should seriously be taken into account in an elementary cyber learning setting in order to boost the learning satisfaction of learners. In the future, the kinds of instructional design that could foster a sense of classroom community is required when cyber learning environments are prepared.

Analysis of Psychological Factors Inducing Cybercrime (사이버범죄를 유발하는 심리적요인 분석)

  • Lim, HeonWook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.157-163
    • /
    • 2021
  • This study attempted to find individual reasons for inducing cybercrime. The survey was conducted targeting investigators and security experts on 11 types of cybercrime. There are 16 internal factors that cause crime and classified according to Maslow's 5 steps. As a result of the survey on a total of 176 items, the credibility of the Cronbach's Alpha coefficient was 0.925. The result of the factor analysis is as follows. Factor analysis results are maslow phase 1 physiological desire is commercial, sykes. Phase 2 safety desires are not punishable and crowd. The three-stage social desire is impulsiveness, indifference, etc. The fourth stage of respect is anonymity and honor. The desire for self-reality in stage 5 has been reduced to indesity, a loss of moderation, morality, and media effects. In conclusion, the physiological desire, the desire for respect for the crime of infringing on the information and communication network, the desire for menstruation, the desire for self-realization for the crime of using information and communication networks, the desire for self-actualization for the crime of illegal content. It was in the order of desire.

The Present State of Domestic Alert Systems for Cyber Threats (사이버 위협에 대한 국내 경보 체계 현황)

  • 이도훈;백승현;오형근;이진석
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.251-257
    • /
    • 2004
  • Todays, the more information technologies(IT) like internet is developed, the more main facilities of individuals and social organizations get deeply involved in IT. Also, the trend of cyber threats such as internet worms and viruses is moving from local pc attacks to IT infrastructure attacks by exploiting inherent vulnerabilities of IT. Social organizations has a limit to response these attacks individually, and so the systematic coordinate center for social organizations is necessary. To analyze and share cyber threat information is performed prior to the construction of the coordinate center. In this paper, we survey domestic alert systems for cyber threats of related organizations and companies, and then classify them into two categories by the range of threat assessment: global alert systems for global If infrastructure and individual alert systems for each threat. Next, we identify problems of domestic alert systems and suggest approaches to resolve them.

  • PDF

A Qualitative Study on the Process of Juveniles' Steeping in Cyber Crime : Focused on Internet Fraud (청소년이 사이버범죄에 빠지는 과정 - 인터넷사기 중심으로 -)

  • Choi, Ok-Chai
    • Korean Journal of Social Welfare
    • /
    • v.56 no.4
    • /
    • pp.103-122
    • /
    • 2004
  • This study is aimed to examine the process of juveniles' steeping in cyber crime for finding out data which could be applied to prevent juveniles' cyber crime and to rehabilitate the juveniles related in cyber crime. Also, this study is designed focusing on the Grounded Theory method, and 5 probationees connected with internet fraud have been interviewed as participants for this study. For the juveniles who had been steeped in cyber crime, some findings according to the analysed data have been emerged in the context of social work intervention. First, interventions need to be focused on the improvement of social environment and juveniles' crooked thoughts to prevent juvenile's Internet fraud and to rehabilitate juveniles related with Internet fraud. Second, workers need to guide the juveniles who have been indecisive on the another crime into regretting their guilty attitude in depth. Third, the prevention of juveniles' Internet fraud needs to be conducted on the level of social movement, and social work practice centers need to grope concrete programs networked with correctional authorities for the social movement.

  • PDF

Analysis of Cyber Crime and Its Characteristics (사이버범죄 유형별 특징 분석 연구)

  • So-Hyun Lee;Ilwoong Kang;Yoonhyuk Jung;Hee-Woong Kim
    • Information Systems Review
    • /
    • v.21 no.3
    • /
    • pp.1-26
    • /
    • 2019
  • Now we are facing with a possibility of having crimes, which have been only possible offline, in cyber spaces as well.Especially, a recent growth in the use of SNS, promoted by popularization of smart phones, also has led an abrupt increase in cyber crime. It would be important to have a understanding of cyber crime and its characteristics by type as well as factors associated with each type of cyber crime in order to devise appropriate preventive measures against cyber crime. However, most of the previous studies on cyber crimesolely made through literature review or indirect approaches. Therefore, this study has been designed to conduct the interview with actual suspects(criminals) of cyber crime to address factors of cyber crime and to devise specific preventive measures and countermeasures against cyber crime. Especially, among various types of cyber crime, this study aims at addressing the 'trades' and 'financial transaction' of crimes committed using the information and communication network and the 'cyber libel/insult'of crimes committed using unlicensed contents, which have been soared recently and become significant issues. The findings of this study could be beneficial for the society since it has managed to conduct the interview and reveal relationships among major factors of cyber crime. The findings of this study could be used for devising and developing proper preventive and countermeasures against cyber crime, in turn reducing and preventing its damage.