• 제목/요약/키워드: 사이버 사회

Search Result 705, Processing Time 0.475 seconds

The Structural Relationship among Self-Regulated Learning, Social Presence, Learning Flow, Satisfaction in Cyber Education utilizing Electronic Media (전자매체를 활용한 사이버수업에서 자기조절학습능력, 사회적 실재감, 학습몰입, 만족도 간의 구조적 관계 규명)

  • Joo, Young-Ju;Chung, Ae-Kyung;Yi, Sang-Hoi;Kim, Sun-Hee
    • 전자공학회논문지 IE
    • /
    • v.48 no.2
    • /
    • pp.71-78
    • /
    • 2011
  • The purpose of the present study is to examine the causal relationship among self-regulated learning, social presence, learning flow and satisfaction in cyber education utilizing electronic media. For this study, 304 students at W cyber university in Korea completed surveys in the fall semester of 2010. The result of this study indicated that there was a meaningful effect of self-regulated learning on learning flow and satisfaction. In addition, we founded learning flow has an intermediating effect between self-regulated learning and satisfaction. Based on these results, this study propose strategies to raise satisfaction by improving students' leading role in their learning.

Exploratory Study on Perceptions and Relationships Among Dominants of Deviant Behavior in Cyber Space (사이버 일탈행위에 영향을 미치는 요인에 관한 탐색적 연구)

  • Kim, Mi-Ryang;Um, Myoung-Yong;Kim, Tae-Ung
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.5
    • /
    • pp.27-35
    • /
    • 2007
  • The purpose of this research is to explore gender differences in perceptions and relationships among dominants affecting deviant behavior of adolescent in cyber space. This study developed a research model to analyze the factors explaining the intensity level of cyber deviant behavior, employing internet usage, awareness of anonymity, fear of cyber crime, and perceived seriousness as major research variables, and collected 478 survey responses from college students in Seoul.

Cyber Battle damage assessment framework (사이버 전투 피해 평가 프레임워크)

  • Kim, Duhoe;Kim, Yonghyun;Kim, Donghwa;Shin, Dongkyoo;Shin, Dongil
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.178-181
    • /
    • 2017
  • 정보통신 기술의 발전으로 개인뿐만 아니라 경제, 행정, 국방 등 사회 전반에서 사이버 공간의 중요성이 대두되고 있다. 특히 국방부에서는 사이버 관련 공격들에 관한 피해를 평가하는 연구가 활발히 진행되고 있다. 본 논문에서는 사이버 전투 피해평가 프레임워크를 제안한다. 사이버 전투 피해평가 프레임워크는 아군이 사이버 공격에 의해 피해를 입은 뒤 지휘 통제실에게 아군의 피해를 알리고 장비의 손상도는 얼마인지 작전에 이상을 미치는 영향은 얼마인지 계산하여 제공한다. 본 프레임워크를 사용하면 현 상황을 아군의 사령부가 파악할 수 있게 되어 지휘 결심을 하는데 도움을 주어서 작전을 성공 시킬 수 있게 도와준다.

Trends in Cyber Range Technology in the Field of Information Security (정보보호 분야에서의 사이버 레인지 기술 동향)

  • Yu, Jaehak;Koo, Kijong;Kim, Ikkyun;Moon, Daesung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.208-211
    • /
    • 2022
  • 최근 COVID-19 팬데믹 시대 도래로 ICT 기술 기반의 지능화된 사회실현에 대한 관심이 높아지고 있지만, 사이버 위협의 다변화로 그 범위와 피해 또한 확대되고 있다. 특히, 개인의 민감 데이터뿐만 아니라, 산업체와 공공기관의 사이버 위험성 및 노출은 심각한 문제가 발생할 수 있다. 본 논문에서는 이러한 정보보호 분야에서의 위협행위 등을 탐지, 분석, 대응할 수 있는 교육 프로그램 개발과 전문 인력양성을 위한 사이버 레인지의 국내·외 기술 동향을 살펴보고자 한다. 마지막으로, 더욱 지능화되고 발전하는 사이버 위협으로부터 이를 방지하고 대응하기 위한 사이버 레인지의 발전 방향을 논하고자 한다.

The countermeasure against recent cyber terrors (최근의 사이버테러에 대한 대응방안)

  • Jeong, Gi-Seog
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.89-96
    • /
    • 2012
  • Information society which came due to advance of Information Technology improved the social and economical productivity as well as the quality of national life. But behind the right function the adverse effect as cyber terror is serious and become a big issue. Recently, hackings on a big scale occur frequently. The personal information stored in Internet company is leaked and customers are badly damaged by paralysis of banking system. Also hacking attacks by North Korea occur frequently. It causes confusion in our society and a threat to national security. In this paper, the trend of domestic cyber terror is observed and the countermeasure against cyber terror is proposed.

The Aspectual Theory of the Cybercharacter (사이버캐릭터의 위상론)

  • 이선교
    • Archives of design research
    • /
    • v.12 no.4
    • /
    • pp.182-190
    • /
    • 1999
  • There has been the rapid change of paradigm with the overflow of terms related to computers such as information, digital, cyber, virtual world and the change of time concept on the ground that it is common to change the world into virtual time. This study is about cybercharacters working in air-broadcasting with rapidly-developing internet, The cybercharacters including 3D animation developed from 2D animation are know to be manufactured with use of electronic mediun and computers and to exist in electronics. Though the emergence of the cybercharacters has a lot of gflnetic roots according to their objectives, they have in common that they are made by 3D graphics and they work in the virtual space, The great traits of the cybercharaters lie in the extension of interfacial function and ecological growth. In the cyberspace the interface, the meeting point between a computer and its users is the most important, The cybercharacters as medium providing new ruman interface become effective with growing interest in virtual reality, The cybercharacters also keep the ecological traits, They can also bring about added value with infusion of image and development of the network, These cybercharacters can also play the important parts in the continually developing cyberspace, The successful birth of the cybercharacter are based on, the technological power. assistance of fund and the ctrltural background, The information-entertainment of the cybercharacters functions well with the accompinimene of these three things, The cybercharacters can make a subject which keeps single issue as a central point of the virtual realty, The cybercharacters can also be connected with equity of "Korean knowledge information society" in the cultural rule of the internet and sociocul tural identity, identity.

  • PDF

A Convergence Study on the Affecting Factors of Cyber Lecture for University Students (대학생의 사이버강의 영향 요인에 관한 융복합 연구)

  • Kang, Keoung-Shim
    • Journal of Digital Convergence
    • /
    • v.17 no.4
    • /
    • pp.41-47
    • /
    • 2019
  • The purpose of study is to enhance the convergence effects of cyber lecture for university students. The results were derived through the comparison and verification of recognition levels before and after cyber lectures. The study material was a questionnaire composed of 15 questions divided into five areas; usefulness, enjoyment, academic relevance, social intention and usage intention. The recognition levels significantly improved after learning in five areas with particularly large improvements in enjoyment and academic relevance. The recognition levels significantly improved in the five areas(p<.001). With regard to changes in recognition levels by major, social science majors showed significant improvements in usage intentions after learning. Cyber lectures for university students were proved to be generally convergence effective.

A Geographical Study on Characteristics of Political Activities in Cyberspace and Interrelationship between Online and Offline: A case of South Korea's Presidential Election in 2012 (가상공간에서의 정치 활동의 특징과 오프라인 환경과의 연계성에 대한 지리적 고찰: 2012년 대통령 선거를 사례로)

  • Park, Sookyung
    • Journal of the Korean Geographical Society
    • /
    • v.48 no.5
    • /
    • pp.686-708
    • /
    • 2013
  • The goal of this investigation is to examine the matter as to how various cyberpolitical activities such as on-line civic participation, cyber parties, development and movement of civil society networks are appeared in cyberspace; and how political activities in cyberspace are associated with offline environment. This research was based on in-depth and open-ended interviews centering around 20s (32 interviewees) and the major results are as in the following. First, in terms of on-line civic participation, searching political issues occur in places, where internet users can access information easily relatively, and creating or reconstructing political information is identified in places giving stability or affinity to the public society. Second, even though each party's homepage for the channel of cyber parties has enough capacity as bridgespace, which takes charge of supporting f lows of people, goods, capital, and ideas, most of them don't play a role to establish virtual or real networks. Exceptively, cyber parties contribute to make temporalized places, where nobody takes the responsibility, somewhat. Third, the development and movement of civil society networks is divided into several segments according to political interests and tendency in online; furthermore, such a cyberpolitical activity influences human networks and the decision of major places for political activities in offline.

  • PDF

Cyber kill chain strategy for hitting attacker origin (공격 원점 타격을 위한 사이버 킬체인 전략)

  • Yoo, Jae-won;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2199-2205
    • /
    • 2017
  • The development of modern ICT technology constitutes cyber world by using infrastructure in country and society. There is no border in cyber world. Countries around the world are carrying out cyber attacks for their own benefit. A cyber killer strategy is needed to defend cyber attacks. In order to defend the cyber attack or to determine the responsibility of attack, it is important to grasp the attacker origin point. Strategic cyber kill chains are needed to strike against the attacker origin. In this paper, we study the analysis of attacker origin. And analyze the cyber kill chain for attacker origin point strike. Study the efficient and customized cyber kill chain strategy for attacking the origin point. The cyber kill chain strategy will be a practical strategy to replace the power of nuclear and missiles with asymmetric power.

Cyber kill chain strategy for hitting attacker origin (공격 원점지 타격을 위한 사이버 킬체인 전략)

  • Yoo, Jae-won;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.306-309
    • /
    • 2017
  • The development of modern ICT technology constitutes cyber world by using infrastructure in country and society. There is no border in cyber world. Countries around the world are carrying out cyber attacks for their own benefit. A cyber killer strategy is needed to defend cyber attacks. In order to defend the cyber attack or to determine the responsibility of attack, it is important to grasp the attacker origin point. Strategic cyber kill chains are needed to strike against the attacker origin. In this paper, we study the analysis of attacker origin. And analyze the cyber kill chain for attacker origin point strike. Study the efficient and customized cyber kill chain strategy for attacking the origin point. The cyber kill chain strategy will be a practical strategy to replace the power of nuclear and missiles with asymmetric power.

  • PDF