• Title/Summary/Keyword: Cyber Target

Search Result 162, Processing Time 0.025 seconds

A study on specializing the University Museum in the Perspective of Culture, Arts, and Science (문화.예술.과학의 관점에서 대학박물관의 특성화를 위한 기초연구)

  • Choe, Jong-Ho
    • KOMUNHWA
    • /
    • no.68
    • /
    • pp.25-39
    • /
    • 2006
  • This article attempts to define identity, role and functions of a university museum and to suggest specialization of the university museum in the perspective of culture, arts, and science. A university museum is defined as a center for the service of the university community and its development which acquires, researches, communicates, exhibits and educates, for purposes of eduinfotainment,29 material evidence of people and their environment. The target user of the today's university museum are not only professors, students, university workers, but also university neighbourhood such as the related professionals, patrons, parents, school children and villagers. A multi-dimensional and multi-purpose university museum can be established and managed in a real world and / or a cyber world in the perspective of culture, arts, and science. Based on a ubiquitous system30 in a cyber world vis-a-vie a real world, the university museum can be easily utilized by users anywhere, anytime and any device. In order to specialize the university museum in the perspective of culture, arts and science, it is desirable that the university museum director with the CEO of the university community promote the specialization of the university museum based on philosophy and strategies of university community management after they definitely evaluate the components and resources of the university museum such as human powers, museum collections, organizational, technological, capital, spacial and symbolic resources, The specialization of the university museum should be projected and executed in the direction of maintaining the typical scope of museum activities and managing the effective museum management. Specializing the university museum in the perspective of culture, arts, and science can contribute not only to establish the identity of the university community and to perform role and functions of the university museum but also to encourage academic development, to revaluate the brand of the university community and to promote the marketing for the university.

  • PDF

Comparison of Elementary Science Education between Schools and A Education Institute for the Gifted (학교와 영재교육원에서의 초등과학교육 비교)

  • Kim, Hoi-Kyeong;Chae, Dong-Hyun;Choi, Young-Owan
    • Journal of the Korean Society of Earth Science Education
    • /
    • v.4 no.3
    • /
    • pp.242-250
    • /
    • 2011
  • The present study compared the contents and methods of elementary science education in schools and education institutes for the gifted and surveyed the contents and methods of science education for the gifted desired by students in order to set the direction of elementary science education at education institutes for the gifted. For this study, we conducted interviews with a 5th-grade male student and a 6th-grade female student at the science class of the Education Institutes for the Gifted run by Iksan Education Office. Besides, printed materials were collected and used to refer to the contents of education. The results of this study are as follows. First, in school, the student learn according to the curriculum defined by the government and the contents begin with elementary and basic ones and move step by step to deeper and wider scientific principles. On the contrary, in the education institute for the gifted, the contents of teaching materials are decided at the teacher's discretion, and because they target gifted children, their level is higher than that of the science curriculum in school. Second, the most common teaching method in school is lecturing and, next, experiments, group activities, etc. On the contrary, in the education institute for the gifted, experiments are used most frequently, and various educational methods are adopted including lectures, project learning and cyber learning. Third, the contents of science education that gifted children wanted to learn are not limited to any specific area. Science education methods that gifted children wanted were various, including project learning, group activities, experiments, and report making and presentation.

Implementation of Virtual Reader and Tag Emulator System Using DSP Board (DSP 보드를 이용한 가상의 리더와 태그 에뮬레이터 시스템 구현)

  • Kim, Young-Choon;Joo, Hae-Jong;Choi, Hae-Gill;Cho, Moon-Taek
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.10
    • /
    • pp.3859-3865
    • /
    • 2010
  • Modeling a virtual reader and tags, the emulator system is realized by using a commercial signal generation device to make signal, a data collection equipment, and DSP board. By using a Virtual UHF RFID (860 ~ 960 [MHz]) reader/tags module, a developed RFID reader, protocol of tag, and properties of RF support to provide the way how to verify the suitability to international standards (ISO 18000-6 Type C, EPCglobal C1G2). In this paper, to implement a proposed model reader and tag model, Visual DSP is applied by using DSP board, composing the system's signal generators, signal analyzers and performance verification, the target readers or tags, RFID emulator control computesr and control programs.

A study on the detection of DDoS attack using the IP Spoofing (IP 스푸핑을 통한 DDoS 공격 탐지 방안에 대한 연구)

  • Seo, Jung-Woo;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.147-153
    • /
    • 2015
  • Since the DoS(Denial of Service) attack is still an important vulnerable element in many web service sites, sites including public institution should try their best in constructing defensive systems. Recently, DDoS(Distributed Denial of Service) has been raised by prompting mass network traffic that uses NTP's monlist function or DoS attack has been made related to the DNS infrastructure which is impossible for direct defense. For instance, in June 2013, there has been an outbreak of an infringement accident where Computing and Information Agency was the target. There was a DNS application DoS attack which made the public institution's Information System impossible to run its normal services. Like this, since there is a high possibility in having an extensive damage due to the characteristics of DDoS in attacking unspecific information service and not being limited to a particular information system, efforts have to be made in order to minimize cyber threats. This thesis proposes a method for using TTL (Time To Live) value in IP header to detect DDoS attack with IP spoofing, which occurs when data is transmitted under the agreed regulation between the international and domestic information system.

A Proposal of Risk Management Framework for Design as a Secure Power Control System (안전한 전력 제어시스템 설계를 위한 위험관리 프레임워크 제안)

  • Park, Jun Yong;Shin, Sumin;Song, Kyoung-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.425-433
    • /
    • 2016
  • In smart grid, enhancement of efficiency and interoperability of electric power system is achieved through the connection with outer network, and this induces that power grid system is threatened increasingly, becomes the main target of cyber terrorism, and is sincerely required to design the secure power system. Although SSDLC(Secure System Development Life Cycle) is used for risk management from the design phase, traditional development life cycle is somewhat limited for satisfaction of information security indicator of power control system. Despite that power control system should reflect control entities of information security considering its own characteristics, validation elements are insufficient to apply into real tasks based on existing compliance. To make design of diagnostic model and assessment process for power control system possible and to give a direction for information security and present related indicator, we propose the new risk management framework of power control system which is applied operational security controls and standard architecture presented by IEC 62351 TC 57 with enterprise risk management framework.

A Systematic Review of Validation Studies on Depression Rating Scales in Korea, with a Focus on Diagnostic Validity Information : Preliminary Study for Development of Korean Screening Tool for Depression (국내 우울증 평가도구 타당화 연구의 체계적 고찰-진단적 타당성을 중점으로 : 한국형 우울 선별 도구 개발을 위한 예비 연구)

  • Jung, Sooyun;Kim, Shin-Hyang;Park, Kiho;Jaekal, Eunju;Lee, Won-Hye;Choi, Younyoung;Lee, Seung-Hwan;Choi, Kee-Hong
    • Anxiety and mood
    • /
    • v.13 no.2
    • /
    • pp.53-59
    • /
    • 2017
  • Reliable and valid diagnostic screening tools in the primary care setting enable accurate estimation of depression in individuals at risk or in need of treatment, and provide patients with an opportunity to receive optimal treatments. Although there have been extensive studies on screening tools for depression used in domestic mental health settings, there is little consideration and lack of a thorough review of the diagnostic validity of screening tools. In the current review, we selected 13 representative screening tools for depression which were evaluated in a total of 19 validation studies conducted in Korea. We summarized DSM-5 target domains, diagnostic indices, sensitivity, specificity, cut-off scores, and diagnostic validity information for each tool. Finally, the depression measurement expert group was constituted to evaluate the current status of screening tools for depression, and their recommendations for a new screening tool were summarized. This study was conducted as part of the Mental Health Technology Development project to develop the Korean screening tool for depression (K-DEP).

A Study on Modeling Framework of Convergence Business (융합 비즈니스 모델링 프레임워크에 관한 연구)

  • Kim, Duk-Hyun
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.4
    • /
    • pp.175-196
    • /
    • 2012
  • Compared to the wide spread of convergence in government and industries there are still lack of theoretical foundation and effective methodologies to successfully implement it. Especially, there are few remarkable results on the ideal types of convergence business model (BM) in both domestic and foreign researchers. In this paper we show theoretical types, strategic alternatives, and design steps of convergence BM could be developed based on '4WH1H model' which is a conceptual framework of a BM. 4W1H model includes 5 constituents of a BM, i. e., customer value, value proposition, operation, target market, and supply capability. We derive 5 theoretical types of convergence BMs depending on the focus of innovation, i.e., value, product, operation, market, and capability. After defining the constituents and types (i.e., structural aspects) of convergence BM, we also show a BM could be linked with business strategy by defining the interaction among 5 constituents (i.e., behavioral aspects) of convergence BM.

Traumatic Experience and the obsessive behaviors in romantic relationship of Female Sex Workers (성매매 여성의 외상 경험과 이성 관계 집착)

  • Kim, Su-Sie
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1632-1643
    • /
    • 2013
  • This study investigated the characteristics of obsessive behaviors in romantic relationship of 42 female sex workers and the effect of traumatic experiences on them. Research results that there was no significant difference in loneliness, jealousy, over sensitiveness between the female sex workers group and the controls. But fear of rejection and doubt in the romantic relationship are significantly higher in the female sex workers group than in the controls. Among the subscales, childhood neglect and family secret were most frequently associated with the various obsessive behaviors. This is also the case for the control group, with family secret and physical abuse being the most. Finally, in regression analysis, in the control group, childhood physical abuse had the biggest impact on the obsessive behaviors in romantic relationship. On the other hand, the target group, childhood neglect had the biggest impact on the obsessive behaviors in romantic relationship.

A Study on Invasion of Privacy and Right to be forgotten by Internet Cookie Technology (인터넷 쿠키로 인한 프라이버시 침해와 잊혀질 권리에 관한 연구)

  • Choi, Younsung;Kwon, Oh-Geol;Won, Dongho
    • Journal of Internet Computing and Services
    • /
    • v.17 no.2
    • /
    • pp.77-85
    • /
    • 2016
  • Internet cookie technology is designed for solving unreliable problem of HTTP's inherent property and notifying user's previous activity to web site's server, so it is useful to provide suitable service for individual user. However, the cookie techniques are becoming more sophisticated such as the third cookie and super cookie. And its included information is applied for advertisement and target marketing strategy, so the problem occurs that user's personal information is collected excessively. However, our law does not recognize the internet cookie as personal information so user cannot know where own internet cookie is stored and applicable. Therefore, in this paper, we explain the internet cookie technology, the privacy invasion and right to be forgotten for solving problem due to the internet cookie. And we analysis the relationship between the information of internet cookie and personal information, and then present the improvement requirement on the law and technology to use internet cookie securely and conveniently.

A Study on Real IP Traceback and Forensic Data Generation against Bypass Attack (우회적인 공격에 대한 실제 IP 역추적 실시와 포렌식 자료 생성)

  • Youn, Byung-Sun;Yang, Hae-Sool;Kim, Dong-Jhoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.143-151
    • /
    • 2008
  • Execute IP traceback at this paper as target an intruder's attacking that Bypass Attack in order to avoid an exposure of own Real IP address Design IP traceback server and agent module, and install in Internet network system for Real IP traceback. Set up detection and chase range aggressive loop around connection arbitrariness, and attack in practice, and generate Real IP data cut off by fatal attacks after data and intrusion detection accessed general IP, and store to DB. Generate the Forensic data which Real IP confirms substance by Whois service, and ensured integrity and the reliability that buy to early legal proof data, and was devoted to of an invader Present the cyber criminal preventive effect that is dysfunction of Ubiquitous Information Society and an effective Real IP traceback system, and ensure a Forensic data generation basis regarding a judge's robe penalty through this paper study.

  • PDF