• Title/Summary/Keyword: 사이버 전환

Search Result 95, Processing Time 0.028 seconds

A Study on the Online Bl09 Structure and the Capitalism Consumption Culture: Analysis of the Cyworld Web Pape Use (온라인 블로그 구조와 자본주의 소비문화의 관계 분석 - 싸이월드 이용을 중심으로)

  • Kim, Mi-Sun;Yu, Sae-Kyung
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02b
    • /
    • pp.761-769
    • /
    • 2006
  • 한국사회에서 새로운 미디어 문화로 가장 각광받는 것 중 하나가 '싸이월드(www. cyworld.com)' 이다. 싸이월드는 웹(Web)에서 하루하루의 일기(Log)를 쓰는 개념인 '개인 블로그(Blog)'로써 개인 미니 홈페이지 형태이다. 이는 단순한 트렌드에 그치는 것이 아니라, 2000 년대 초 카페나 커뮤니티를 기반으로 한 '집단(group) 사이버 문화'를 '개인 (individual) 사이버 문화'로 전환시키는 하나의 문화적 수준에서 논의되고 있다. 그런데 블로그 사이버 문화는 자본주의 소비문화와 밀접하게 연결된다. 현대의 사이비 문화는 개인의 능동적 선택과 이용을 전재로 하므로 자율적이고 독창적인 방식으로 미디어 문화를 소비하는 데, 자본주의 경제사회 속에서 개인의 자율성은 표면적인 이미지에 지나지 않는다. 특히 싸이월드와 같은 개인 미디어는 더욱 개인의 자율성에 기반한 문화행위를 실천하지만, 사실 싸이월드틀 움직이는 경제구조 속에서 규제된다. 싸이월드 이용자가 기본 미니홈피 플랫폼에 자신만의 개성을 표현하기 위해서는 '도토리' 라는 싸이월드의 전자화폐를 사용해야 하고, 이를 이용해 미니룸, 미니미, 스킨, 배경음악 등의 아이템을 구매한다. 그러나 싸이월드 이용자들은 개인의 자율성에 의해 소비행위를 창출하는 것이므로 이를 통해 이윤을 획득하는 자본세력에 대해서는 고려하지 않는다. 이것이 바로 자본주의 소비문화에 의해 지배되는 부정적인 '실제의 왜곡' 이다. 개인의 자율성을 강조함으로써 자본가의 이윤획득 구조를 은폐하여 자본본주의 소비를 재생산하고 강화하는 것이다. 따라서 우리는 개인 문화를 강조하는 현대 미디어 문화구조를 자본주의 권력의 장(場)으로 이해해야 한다. 그리고 미디어 문화의 생산과 소비를 통해 자본주의 소비 문화가 재생산되고 강화되는 현상을 비판함으로써 온라인 블로그의 커뮤니케이션 특성이 생산자(producer)로서의 기능보다 소비자(consumer) 로서의 기능이 강조되고 있음을 이해해야 할 것이다.

  • PDF

Cyber-attack and Cybersecurity Design for a Smart Work System (스마트워크 시스템을 위한 사이버 공격 및 사이버 보안 설계)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.207-214
    • /
    • 2019
  • The speed of technological development is increasing, and high-performance digital devices are spreading. Wired digital devices such as PCs have been optimized for existing wired environments, but needs are shifting away from the constraints of space and space to smart work that enables efficient work anywhere and anytime. The Smart Work System security design is needed to secure integrity and availability in the face of various security threats including physical threats (lost, stolen, and damaged terminals), technical threats (data theft, DoS: denial of service), and unauthorized access outside the wired environment. In this study, we analyzed smart work network systems, wired / wireless link systems, and digital smart devices. We also studied cyber-attack analysis and cybersecurity design methods for a Smart Work wired system and a future wireless system. This study will be used as basic data for building a secure Smart Work system.

A Study on the Concept of Digital Environmental Rights and Reinforcement of Information Subject (디지털 환경권 개념 정립과 정보교과 교육 강화에 대한 연구)

  • Yoo, Jiyeon
    • Journal of The Korean Association of Information Education
    • /
    • v.24 no.2
    • /
    • pp.189-199
    • /
    • 2020
  • This study aims to emphasize the necessity of strengthening the information subject through the introduction of a new concept of rights called 'digital environmental rights' and proposes an improvement in the educational composition model of the information culture section in the information subject. Through the introduction of the concept of digital environmental rights, we intend to provide a logical basis for making the information subject a required subject. In addition, we intend to enhance the competencies required for living in a digital environment by improving the structure of the information culture section in the information subject. As a study on this, the logic of the concept of rights required in the digital environment is analyzed and the concept of digital environmental rights applied to it is established. Furthermore, by analyzing relevant curricula in major countries, including the United States, Australia, and Japan, which provide the main basis for digital environmental rights, an improvement plan for the educational composition in the information and culture education sector is formulated. The results of the study are as follows: First, digital environment rights are 'rights to enjoy a pleasant and safe digital environment'. Second, the components of digital environmental rights include rights for the environment (cyberethics), rights of the environment (cybersafety), and rights about the environment (cybersecurity). Third, in the major countries studied various educational structures are being implemented with regard to information-related education contents on the digital citizenship, code ethics, and new technology security.

A Study on the Construction of Knowledge-based Digital Library Model in Korea University Library (지식기반 전자도서관 모형구축에 관한 연구 - 대학도서관을 중심으로 -)

  • Lee, Eung-Bong;Lu, Bum-Jong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.34 no.4
    • /
    • pp.49-67
    • /
    • 2000
  • The purpose of this study is to suggest knowledge-based digital library model that is applicable in korea university library. This paper provides brief accounts of research and development trends of digital library in referring some major digital library projects that are in progress, or just completed. There follows a suggestion of eight essential modules for knowledge-based digital library system, that are infrastructure development of dissertation presentation and database construction, management and service of collections, infrastructure construction of journal service, development of unified viewer, database conversion, distributed & integrated retrieval system, cyber campus(private work space), and database connection.

  • PDF

A study on the Development of Animated Graphic Chatting Program based on Facial Expression (표정과 제스처에 기반한 대화기법을 활용한 Animated Graphic Chatting 프로그램 개발 연구)

  • 안상혁;정진오
    • Archives of design research
    • /
    • v.12 no.4
    • /
    • pp.129-137
    • /
    • 1999
  • We see that the Interactive Entertainment Industry on the internet has a great potential to grow in the 21st century. There will be many kinds of internet content. Internet contents can be classified with six categories such as identity, entertainment, learning, shopping, community. However, we see that shopping and community have a higher market share among the six. Recently, community has become more important in making an internet business sucessful, because it is valuable in creating virtual society in cyber space. A chatting program has been an effective means to form community. So we developed the animation graphic chatting program that functions to express an emotion effectively compared to the text chatting.

  • PDF

Time-Based MDA Architecture Modeling for Safety-Critical Systems (안전필수 시스템을 위한 시간기반 MDA 아키텍처 모델링)

  • Lim, Yoojin;Choi, Eunmi
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.4
    • /
    • pp.443-453
    • /
    • 2012
  • In order to minimize the damage from system failures, systems over various fields are requested to contain the safety-critical features. In this paper, we deliver the considerable issues, especially, in the cyber physical systems that is recently used as a safety-critical system, as well as we propose the model driven architecture based on time as its the important factor. Based on meta-modeling approach, we introduce the time-based architecture which is associated with deadline, transition state, and threshold, and also we work out a design for this by using model driven architecture. We propose a realizable safety-critical architecture by means of showing failure handling components with safety transaction model from the meta-model. In the detailed models and the example, we design a basic safety processing state, a multiple safety processing state, and a compound safety processing state for completing the safety-critical system architecture.

The Grammar of Female Exploitation In a Digital Matrix: Analysis of the Mechanism of Digital Sexual Violence and Counter-Discourses on it (디지털 매트릭스의 여성착취문법: 디지털 성폭력의 작동방식과 대항담론)

  • YUN, Ji-Yeong
    • Journal of Korean Philosophical Society
    • /
    • no.122
    • /
    • pp.85-134
    • /
    • 2018
  • In this article, I will provide a philosophical discourse on digital sexual violence that is a technological version of male violence. First, critical analysis of the mechanism of the spatiality and the temporality of the hidden and illicit camera is developed to focus on the immeasurable damage of this violence. I elaborate a notional division between digital sexual violence and cyber sexual violence. Secondly, the ease of taking images of women's bodies and the rapid transmission of these images through the advancement of digital communication technology and hyperconnectivity, lead to use these images as a new digital monet for men. They consolidate their male solidarity by reaffirming female inferiority and humiliating women. Thirdly, the invention of the structure of the new affect to resist to digital sexual violence is crucial. For that, it would be necessary to pass from the sexual shame to the sexual displeasure and to the socio-political indignation. These would create another opportunity to resist to digital sexual violence.

A Study on Structuring of Information Sharing Platforms Based on Risk Communication Theory (위험커뮤니케이션 이론에 기반을 둔 정보공유 플랫폼 구조화 연구)

  • Yoo, Ji-Yeon;Park, Hyang-Mi
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.59-72
    • /
    • 2019
  • In this day and age physical and cyber boundaries have converged due to the development of new technologies, such as the Internet of Things (IoT) and the Cyber Physical System (CPS). As the relationship between physical system and cyber technology strengthens, more diverse and complex forms of risk emerge. As a result, it is becoming difficult for single organization or government to fully handle this situation alone and cooperation based on information sharing and the strengthening of active defense systems are needed. Shifting to a system in which information suitable for various entities can be shared and automatically responded to is also necessary. Therefore, this study tries to find improvements for the current system of threat information collecting and sharing that can actively and practically maintain cyber defense posture, focusing particularly on the structuring of information sharing platforms. To achieve our objective, we use a risk communication theory from the safety field and propose a new platform by combining an action-oriented security process model.

The Influence of Learning Commitment and Interest by Repetitive Education Activities of Adult Learners on Satisfaction in Online Learning Using Flip Learning Pedagogy (플립러닝을 활용한 온라인 학습에서 중·장년층 학습자의 반복학습에 따른 학습몰입과 흥미가 학습만족도에 미치는 영향)

  • Kang, Tae-Gu;Lim, Gu-Won
    • Journal of Industrial Convergence
    • /
    • v.19 no.3
    • /
    • pp.27-34
    • /
    • 2021
  • In the era of the 4th industrial revolution, the age of artificial intelligence, the development of ICT technology is having various effects on the online and offline educational environment. The universal access of online education changes the educational paradigm and converts it to a learner-centered service. At the time when a new educational environment is required to change, interest in flip learning is increasing. Even adult learner's online learning needs is also shown very high. The purpose of this study was to investigate how repetitive learning activities through flip learning for middle-aged online learners of K-Cyber University has a relationship and structural relationship between the effects of learning immersion and learning interest on learning satisfaction. Through this study, there is significance in research to suggest direction for learning satisfaction based on flip learning. For further studies, if a model of analysis of various factors that can be measured is specified and applied, it can be used as a research background that can maximize learning satisfaction based on flip learning.

Internet of Things (IoT) Based Modeling for Dynamic Security in Nuclear Systems with Data Mining Strategy (데이터 마이닝 전략을 사용하여 원자력 시스템의 동적 보안을 위한 사물 인터넷 (IoT) 기반 모델링)

  • Jang, Kyung Bae;Baek, Chang Hyun;Kim, Jong Min;Baek, Hyung Ho;Woo, Tae Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.1
    • /
    • pp.9-19
    • /
    • 2021
  • The data mining design incorporated with big data based cloud computing system is investigated for the nuclear terrorism prevention where the conventional physical protection system (PPS) is modified. The networking of terror related bodies is modeled by simulation study for nuclear forensic incidents. It is needed for the government to detect the terrorism and any attempts to attack to innocent people without illegal tapping. Although the mathematical algorithm of the study can't give the exact result of the terror incident, the potential possibility could be obtained by the simulations. The result shows the shape oscillation by time. In addition, the integration of the frequency of each value can show the degree of the transitions of the results. The value increases to -2.61741 in 63.125th hour. So, the terror possibility is highest in later time.