• 제목/요약/키워드: Cyber Networking

검색결과 64건 처리시간 0.024초

An Enhanced Text Mining Approach using Ensemble Algorithm for Detecting Cyber Bullying

  • Z.Sunitha Bai;Sreelatha Malempati
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.1-6
    • /
    • 2023
  • Text mining (TM) is most widely used to process the various unstructured text documents and process the data present in the various domains. The other name for text mining is text classification. This domain is most popular in many domains such as movie reviews, product reviews on various E-commerce websites, sentiment analysis, topic modeling and cyber bullying on social media messages. Cyber-bullying is the type of abusing someone with the insulting language. Personal abusing, sexual harassment, other types of abusing come under cyber-bullying. Several existing systems are developed to detect the bullying words based on their situation in the social networking sites (SNS). SNS becomes platform for bully someone. In this paper, An Enhanced text mining approach is developed by using Ensemble Algorithm (ETMA) to solve several problems in traditional algorithms and improve the accuracy, processing time and quality of the result. ETMA is the algorithm used to analyze the bullying text within the social networking sites (SNS) such as facebook, twitter etc. The ETMA is applied on synthetic dataset collected from various data a source which consists of 5k messages belongs to bullying and non-bullying. The performance is analyzed by showing Precision, Recall, F1-Score and Accuracy.

A Lifestyle-Routine Activity Theory (LRAT) Approach to Cybercrime Victimization: An Empirical Assessment of SNS Lifestyle Exposure Activities

  • Jihae Suh;Jiseon Choe;Jinsoo Park
    • Asia pacific journal of information systems
    • /
    • 제30권1호
    • /
    • pp.53-71
    • /
    • 2020
  • The Internet and all of its possibilities and applications have changed individuals' lifestyles in relation to socializing, working, and how they spend their leisure time. Social networking sites (SNSs), such as Facebook or Instagram, are ideal settings for interacting with others but, unfortunately, they are also ideal settings for motivated offenders to commit cybercrimes. Thus SNS users may be more vulnerable to cybercrime. The purpose of this study is to investigate the occurrence of cybercrime victimization, specifically cyber-harassment, cyber-impersonation, and hacking. Self-report surveys collected from a sample of 147 respondents were examined using the moderated multiple regression analysis and a logistic regression analysis to determine possible relationships between SNS lifestyle exposure activities and cybercrime victimization. The results indicate moderate support for the application of lifestyle-routine activity theory (LRAT) to cybercrime victimization. Possible educational and managerial implications, as well as suggestions for future research, are discussed.

e-테러리즘의 효율적 통제방안 (Efficient countermeasures against e-terrorism)

  • 이윤호;김대권
    • 시큐리티연구
    • /
    • 제20호
    • /
    • pp.271-289
    • /
    • 2009
  • e-테러리즘은 테러리스트들의 국가적인 목적달성의 수단으로 인터넷 등의 사이버공간을 활용하여 테러에 이용하는 것이다. 최근에 일어나고 있는 테러사건들도 사이버라는 공간이 전략적 도구로 이용되었다는 사실을 확인할 수 있었다. 이 연구에서는 e-테러리즘의 주체자인 테러리스트의 다양한 공격형태 그리고 사이버상의 네트워킹 등에 대한 테러의 효율적 통제방안을 모색함으로써 현대적 의미에서의 테러 방지에 대하여 논의하였다. 사이버공간이라는 특수성으로 인해 개별국가에 적용되어지는 문제가 아니라는 점을 감안한다 하더라도 현재 나타나고 있는 국내의 해킹사고 급증, 특히 외국 해커의 경유지로서의 한국이 이용된다는점 그리고 이러한 상황임에도 불구하고, 외국에 비해 전문 보안인력이나 기반시설이 선진외국에 비해 부족하다는 점을 문제점으로 제시 할 수 있었다. 이에대한 대안으로 e-테러리즘에 대응할 수 있는 사이버 정보군 등의 인력양성과 예산확보, e-테러리즘에 대응체계를 종합화 체계화하기위한 네트워크 관리, 사이버 공격현황의 정보수집 및 분석 강화를 제시하였다.

  • PDF

GIS를 이용한 가상 관광시스템 구축방안 (- Construction Method of a Cyber Tourism System using Geographic Information System -)

  • 김용범;서장훈
    • 대한안전경영과학회지
    • /
    • 제5권2호
    • /
    • pp.187-197
    • /
    • 2003
  • In 21st century, According to development of Information Technology, It is clear that the importance of tourism information is extended increasingly. For this reason, It should be needed to realize a general system which make it possible to enjoy cyber tourism based on knowledge information system to recover a local potential growth power, catch a jumping chance again, and hold a new competitive power. But to discuss a tourism information system, the matters of hard ware, software and information mediating system should be reviewed generally, this research is likely to provide a cyber tourism information system through internet as a way of cyber tours through multimedia technology and stereoscopic image technique using GIS (Geographic Information System) centering on the networking system of tourism information. Constructing $\ulcorner$cyber touristy city$\lrcorner$ on internet, foster a new industry, to go balanced with a present tourism industry and experience a virtual reality, various theme tours create high profit to shrunken tourism industry.

GIS를 이용한 가상 관광시스템 구축방안 (Construction Method of a Cyber Tourism System using Geographic Information System)

  • 허준영;서장훈;김용범;박명규
    • 대한안전경영과학회:학술대회논문집
    • /
    • 대한안전경영과학회 2003년도 춘계학술대회
    • /
    • pp.175-183
    • /
    • 2003
  • It should be needed to realize a general system which make it possible to enjoy cyber tourism based on knowledge information system to recover a local potential growth power, catch a jumping chance again, and hold a new competitive power. But to discuss a tourism information system, the matters of hard ware, software and information mediating system should be reviewed generally, this research is likely to provide a cyber tourism information system through internet as a way of cyber tours through multimedia technology and stereoscopic image technique using geographic information system centering on the networking system of tourism information. Constructing $\ulcorner$cyber touristy city$\lrcorner$ on internet, foster a new industry, to go balanced with a present tourism industry and experience a virtual reality, various theme tours create high profit to shrunken tourism industry. Remark : multimedia technology, stereoscopic image, geographic information system

  • PDF

진보된 E-learning 환경으로써 Second Life의 탐색 아이디어와 가능성 (Exploring ideas and possibilities of Second Life as an Advanced E-learning Environment)

  • 백영균
    • 한국산학기술학회:학술대회논문집
    • /
    • 한국산학기술학회 2009년도 춘계학술발표논문집
    • /
    • pp.280-283
    • /
    • 2009
  • Web 2.0 is changing the paradigm of using the Internet which is affecting the e-learning paradigm. E-learning 2.0 based on the Web 2.0 has a bottom-up approach which learners work on content with social networking and collaboration in their own cyberspace. Second Life is presented as a new e-learning environment. - Flexibility, - Strong social networking, - Residents’ creative activities of Second Life ⇨ Unlimited potential to educators Second Life is a classroom built in 3D cyber space.

  • PDF

Towards Open Interfaces of Smart IoT Cloud Services

  • Kim, Kyoung-Sook;Ogawa, Hirotaka
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2016년도 춘계학술대회
    • /
    • pp.235-238
    • /
    • 2016
  • With the vision of Internet of Things (IoT), physical world itself is becoming a connected information system on the Internet and cyber world is computing as a physical act to sense and respond to real-world events collaboratively. The systems that tightly interlink the cyber and physical worlds are often referred to as Smart Systems or Cyber-Physical Systems. Smart IoT Clouds aim to provide a cyber-physical infrastructure for utility (pay-as-you-go) computing to easily and rapidly build, modify and provision auto-scale smart systems that continuously monitor and collect data about real-world events and automatically control their environment. Developing specifications for service interoperability is critical to enable to achieve this vision. In this paper, we bring an issue to extend Open Cloud Computing Interface for uniform, interoperable interfaces for Smart IoT Cloud Services to access services and build a smart system through orchestrating the cloud services.

  • PDF

국가 사이버재난관리 시스템 구축 방안 (A Method of Establishing the National Cyber Disaster Management System)

  • 김상욱;신용태
    • 한국정보과학회논문지:정보통신
    • /
    • 제37권5호
    • /
    • pp.351-362
    • /
    • 2010
  • 우리나라는 IT 기술의 급속한 발전과 인터넷의 급속적인 보급으로 인해 국가 정보화의 기반 인프라가 매우 잘되어 있지만 주변 강대국들의 위협 속에 사이버테러의 위협도 급격히 증가하고 있다. 아울러 전 세계적으로 사이버전(戰)의 위협도 가속화 되고 있다. 지식 정보화 사회에 대한 사이버 공격은 산업과 경제활동은 물론 국가 안위를 근본적으로 위협하는 요인이 된다. 이미 해외 주요 국가들은 한 번의 사이버 공격으로도 국가 안보에 구멍이 뚫려 엄청난 경제적 손실을 가져올 수 있음을 인식하고, 사이버 공간에서 자국민이 안심하고 활동할 수 있도록 안정성을 최대한 보장하기 위한 정책을 마련하여 추진 중에 있다. 이와 더불어 우리나라뿐만 아니라 전 세계적으로 자연적, 환경적 재난의 위협도 증가하고 있다. 인도네시아나 필리핀처럼 쓰나미, 태풍, 지진 동 온갖 자연재해가 수시로 발생하는 국가는 사전 예방과 사후 복구 동 국가 차원의 체계적인 재난관리시스템이 구축되어 이에 대비하고 있다. 우리나라도 사이버테러 위협으로부터 사전 예방과 사후 복구를 위한 체계적인 관리가 필요하며, 이를 위해 국가차원의 사이버 재난관리(Cyber Disaster Management)에 대한 시스템 구축이 절실하다. 이에 따라, 본 논문에서는 해외 주요국의 사이버 안보정책을 분석하여 국가차원의 사이버 재난관리 시스템 구축을 위한 방안을 제안하고자한다.

Cyberbullying Detection in Twitter Using Sentiment Analysis

  • Theng, Chong Poh;Othman, Nur Fadzilah;Abdullah, Raihana Syahirah;Anawar, Syarulnaziah;Ayop, Zakiah;Ramli, Sofia Najwa
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.1-10
    • /
    • 2021
  • Cyberbullying has become a severe issue and brought a powerful impact on the cyber world. Due to the low cost and fast spreading of news, social media has become a tool that helps spread insult, offensive, and hate messages or opinions in a community. Detecting cyberbullying from social media is an intriguing research topic because it is vital for law enforcement agencies to witness how social media broadcast hate messages. Twitter is one of the famous social media and a platform for users to tell stories, give views, express feelings, and even spread news, whether true or false. Hence, it becomes an excellent resource for sentiment analysis. This paper aims to detect cyberbully threats based on Naïve Bayes, support vector machine (SVM), and k-nearest neighbour (k-NN) classifier model. Sentiment analysis will be applied based on people's opinions on social media and distribute polarity to them as positive, neutral, or negative. The accuracy for each classifier will be evaluated.

사이버 물리 컴퓨팅 : 유비쿼터스 건강 관리 응용에 대한 레버리징 클라우드컴퓨팅 (Cyber-Physical Computing: Leveraging Cloud computing for Ubiquitous Healthcare Applications)

  • 하산 아비드;왕진;이승룡;이영구
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2011년도 한국컴퓨터종합학술대회논문집 Vol.38 No.1(B)
    • /
    • pp.41-43
    • /
    • 2011
  • Cyber-Physical Systems are tight integration of computation, networking and physical objects to sense, monitor, and control the physical world. This paper presents a novel architecture that combines two next generation technologies i.e. cyber-physical systems and Cloud computing to develop a ubiquitous healthcare based infrastructure. Through this infrastructure, patients and elderly people get remote assistance, monitoring of their health conditions and medication while living in proximity of home. Consequently, this leads to major cost savings. However, there are various challenges that need to be overcome before building such systems. These challenges include making system real-time responsive, reliability, stability and privacy. Therefore, in this paper, we propose an architecture that deals with these challenges.