• Title/Summary/Keyword: Cyber Dysfunction

Search Result 7, Processing Time 0.021 seconds

A Study on the Classification of Cyber Dysfunction and the Social Cognition Analysis in the Intelligent Information Society (지능정보사회의 사이버 역기능 분류와 사회적 인식 분석)

  • Lim, Gyoo Gun;Ahn, Jae Ik
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.55-69
    • /
    • 2020
  • The Internet cyber space has become more important as it enters the intelligent information society of the 4th Industrial Revolution beyond the information age through the development of ICT, the expansion of personalized services through mobile and SNS, the development of IoT, big data, and artificial intelligence. The Internet has formed a new paradigm in human civilization, but it has focused only on the efficiency of its functions. Therefore, various side effects such as information divide, cyber terrorism, cyber violence, hacking, and personal information leakage are emerging. In this situation, facing the intelligent information society can lead to an uncontrollable chaos. Therefore, this study classifies the cyber dysfunction of intelligent information society and analyzes social cognition, suggests cyber dysfunction standard of intelligent information society, and examines the seriousness of dysfunction, and suggests technical research directions for future technologies and services. The dysfunctional classification of the intelligent information society was classified into five areas of cyber crime and terrorism, infringement of rights, intelligent information usage culture, intelligent information reliability, and social problems by FGI methodology. Based on the classification, the social perception of current and future cyber dysfunction severity was surveyed and it showed female is more sensitive than male about the dysfunction. A GAP analysis confirmed social awareness that the future society would be more serious about AI and cyber crime

ETRI AI Strategy #7: Preventing Technological and Social Dysfunction Caused by AI (ETRI AI 실행전략 7: AI로 인한 기술·사회적 역기능 방지)

  • Kim, T.W.;Choi, S.S.;Yeon, S.J.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.7
    • /
    • pp.67-76
    • /
    • 2020
  • Because of the development and spread of artificial intelligence (AI) technology, new security threats and adverse AI functions have emerged as a real problem in the process of diversifying areas of use and introducing AI-based products and services to users. In response, it is necessary to develop new AI-based technologies in the field of information protection and security. This paper reviews topics such as domestic and international trends on false information detection technology, cyber security technology, and trust distribution platform technology, and it establishes the direction of the promotion of technology development. In addition, the development of international trends in ethical AI guidelines to ensure the human-centered ethical validity of AI development processes and final systems in parallel with technology development are analyzed and discussed. ETRI has developed AI policing technology, information protection, and security technologies as well as derived tasks and implementation strategies to prepare ethical AI development guidelines to ensure the reliability of AI based on its capabilities.

A Standardizing research of Internet adverse effects catalog from Societal phenomenological pointview (사회현상학 관점에서의 인터넷역기능 분류체계 표준화 연구)

  • Kwon, Jung-In;Lee, Seong-Chul;Ahn, Seong-Jin
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.6
    • /
    • pp.1-10
    • /
    • 2011
  • Since IT technology grow rapidly, our ethic of consciousness has become big issue with adverse effect. Many scholar has discussed and tired to solve this problem, but it is still helpless to fix. Therefor in this paper, author will not suggest the solution, but will present model list of adverse effects and cases to prevent accidents. The model list of adverse effects, what author will present is about media addiction, harmful content, cyber-violence, right infringement, cyber terror and decision obstacle. This model list is made by primary and secondary survey. This model will show adverse effect of present day, but also will show future adverse effects that can be prevent. Through out this paper, this model list could use for education plan.

  • PDF

Radiosurgery for Recurrent Brain Metastases after Whole-Brain Radiotherapy : Factors Affecting Radiation-Induced Neurological Dysfunction

  • Gwak, Ho-Shin;Yoo, Hyung-Jun;Youn, Sang-Min;Lee, Dong-Han;Kim, Mi-Sook;Rhee, Chang-Hun
    • Journal of Korean Neurosurgical Society
    • /
    • v.45 no.5
    • /
    • pp.275-283
    • /
    • 2009
  • Objective : We retrospectively analyzed survival, local control rate, and incidence of radiation toxicities after radiosurgery for recurrent metastatic brain lesions whose initial metastases were treated with whole-brain radiotherapy. Various radiotherapeutical indices were examined to suggest predictors of radiation-related neurological dysfunction. Methods : In 46 patients, total 100 of recurrent metastases (mean 2.2, ranged 1-10) were treated by CyberKnife radiosurgery at average dose of 23.1 Gy in 1 to 3 fractions. The median prior radiation dose was 32.7 Gy, the median time since radiation was 5.0 months, and the mean tumor volume was $12.4cm^3$. Side effects were expressed in terms of radiation therapy oncology group (RTOG) neurotoxicity criteria. Results : Mass reduction was observed in 30 patients (65%) on MRI. After the salvage treatment, one-year progression-free survival rate was 57% and median survival was 10 months. Age(<60 years) and tumor volume affected survival rate(p=0.03, each). Acute (${\leq}$1 month) toxicity was observed in 22% of patients, subacute and chronic (>6 months) toxicity occurred in 21 %, respectively. Less acute toxicity was observed with small tumors (<$10cm^3$. p=0.03), and less chronic toxicity occurred at lower cumulative doses (<100 Gy, p=0.004). "Radiation toxicity factor" (cumulative dose times tumor volume of <1,000 Gy${\times}cm^3$) was a significant predictor of both acute and chronic CNS toxicities. Conclusion: Salvage CyberKnife radiosurgery is effective for recurrent brain metastases in previously irradiated patients, but careful evaluation is advised in patients with large tumors and high cumulative radiation doses to avoid toxicity.

A STUDY OF THE TEMPOROMANDIBULAR JOINT IN NORMAL OCCLUSION USING T.M.J TOMOGRAM AND CEPHALOGRAM (단층 및 두부 방사선 계측사진을 이용한 정상교합자의 악관절에 관한 연구)

  • Baik, Hyoung-Seon
    • The korean journal of orthodontics
    • /
    • v.16 no.1
    • /
    • pp.85-106
    • /
    • 1986
  • The purpose of this investigation was to know the means of the T.M.J. space and to compare spational differences in centric relation and centric occlusion by the T.M.J. Tomogram and to study the correlation between the articular eminence slope and the lingual surface slope of the maxillary central incisor by the Cephalogram in near normal occlusion subjects. These results could give contribution for the diagnosis of orthodontic treatment and T.M.J. dysfunction and the assessment of orthopedic treatment and orthognathic surgery. 44 young adults (28 men and 16 women, 21 to 27 years of age) were selected from the Dental students in Yonsei Univ. Criteria for selection was normal occlusion, no clinical signs and T.M.J. dysfunction, no history of orthodontic treatment, and no missing tooth. After submental vertex view analysis. each subject was given the T.M.J. Tomogram in centric relation and centric occlusion and the Cephalogram was given with Quint Sectograph. All data was recorded and statistically processed with the CYBER computer system. Results were analyzed: the following findings and conclusions were derived. 1. The mean value for the combined right and left anterior joint space was 2.549mm, the posterior space was 2.260mm, and superior space was 3.31mm in centric relation. The anterior space was 2.316mm, posterior space was 2.474mm, and superior space was 3.435mm in centric occlusion. 2. In the centric relation position, both condyles were placed more posterioly and superioly in their fossae than in the centric occlusion position by the spatial difference. 3. In the centric occlusion position, both condyles were more symmetrically placed in their fossae with equal anterior-posterioly rather than in the centric relation position. 4. The mean articular eminence angle was $48.19^{\circ}$ and the mean fossa height was 7.911mm. A strong positive correlation between the articular eminence angle and fossa height in T.M.J. Tomogram was found. 5. In Cephalometric analysis, there was a strong positive correlation between the articular eminence slope and the lingual surface slope of the upper central incisor to the FH plane, occlusal plane, and S-N plane. 6. There was moderate positive correlation between the S-E measurements and the fossa height, articular eminence angle, and DcGn < F-H.

  • PDF

A Study on N-IDS Detection and Packet Analysis regarding a DoS attack (DoS공격에 대한 N-IDS 탐지 및 패킷 분석 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.217-224
    • /
    • 2008
  • EThis paper is study regarding banking institution and DoS attack regarding government organization which occurred in 2008. We used a tool aggressive actual DoS You install the N-IDS which used Snort in networks in order to detect a DoS attack. Storages of Winpcap and a packet to detect a packet and MySQL, HSC, to analyze. We install NET Framework etc. E-Watch etc. analyzes Packet regarding a DoS attack of a hacker and TCP, UDP etc. information, Port, MAC and IP information etc. through packet analysis tools. There is a meaning you analyze data regarding the cyber DoS, DDoS attack that is dysfunction of Ubiquitous Information Society, and it generates forensics data regarding an invader and back-tracking analysis data, and to ensure safe Internet information system through this paper study.

  • PDF

A Study on Real IP Traceback and Forensic Data Generation against Bypass Attack (우회적인 공격에 대한 실제 IP 역추적 실시와 포렌식 자료 생성)

  • Youn, Byung-Sun;Yang, Hae-Sool;Kim, Dong-Jhoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.143-151
    • /
    • 2008
  • Execute IP traceback at this paper as target an intruder's attacking that Bypass Attack in order to avoid an exposure of own Real IP address Design IP traceback server and agent module, and install in Internet network system for Real IP traceback. Set up detection and chase range aggressive loop around connection arbitrariness, and attack in practice, and generate Real IP data cut off by fatal attacks after data and intrusion detection accessed general IP, and store to DB. Generate the Forensic data which Real IP confirms substance by Whois service, and ensured integrity and the reliability that buy to early legal proof data, and was devoted to of an invader Present the cyber criminal preventive effect that is dysfunction of Ubiquitous Information Society and an effective Real IP traceback system, and ensure a Forensic data generation basis regarding a judge's robe penalty through this paper study.

  • PDF