• Title/Summary/Keyword: Cyber effectiveness analysis

Search Result 102, Processing Time 0.028 seconds

Analysis of Differences in Teachers' Perception on Educational Attributes and Effects of IPTV

  • LEEM, Junghoon;KIM, Seri;HAN, Seungyeon;SUNG, Eunmo
    • Educational Technology International
    • /
    • v.11 no.1
    • /
    • pp.1-26
    • /
    • 2010
  • The purpose of this study was to identify differences in teachers perception on educational attributes and effectiveness of IPTV according to demographic factors. To investigate possibility of educational application, the participants of the study were teachers selected from IPTV initiative schools in elementary and middle levels nationwide. 55 teachers participated from 22 IPTV model schools nationwide, which were 9 elementary schools, 6 middle schools, 7 high schools. As results of research, there were some significant foundings. In terms of the perception on educational attributes of IPTV, there are explicit perceptional difference between "capital area teachers" and "the other regional teachers". However, there were no significant difference according to school level. Perception of male teachers were more positive than those of female teachers. Also, there were no significant difference according to teaching experience. On the other hand, in terms of the perception on educational effects of IPTV, we could conclude that teachers from metropolitan cities have more negative perception on IPTV than teachers from other kinds of cities have. Regardless of school levels, teachers showed merely fair perception on effectiveness of IPTV. There was significant difference between male teachers and female teachers in perception on educational effectiveness. Also, Results showed no significant differences according to teaching experiences. Future tasks for the development of IPTV strategies require specific need analysis of teachers and collaborative works of policy makers, teachers, researchers, and IPTV service providers.

Malware Detection Using Deep Recurrent Neural Networks with no Random Initialization

  • Amir Namavar Jahromi;Sattar Hashemi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.177-189
    • /
    • 2023
  • Malware detection is an increasingly important operational focus in cyber security, particularly given the fast pace of such threats (e.g., new malware variants introduced every day). There has been great interest in exploring the use of machine learning techniques in automating and enhancing the effectiveness of malware detection and analysis. In this paper, we present a deep recurrent neural network solution as a stacked Long Short-Term Memory (LSTM) with a pre-training as a regularization method to avoid random network initialization. In our proposal, we use global and short dependencies of the inputs. With pre-training, we avoid random initialization and are able to improve the accuracy and robustness of malware threat hunting. The proposed method speeds up the convergence (in comparison to stacked LSTM) by reducing the length of malware OpCode or bytecode sequences. Hence, the complexity of our final method is reduced. This leads to better accuracy, higher Mattews Correlation Coefficients (MCC), and Area Under the Curve (AUC) in comparison to a standard LSTM with similar detection time. Our proposed method can be applied in real-time malware threat hunting, particularly for safety critical systems such as eHealth or Internet of Military of Things where poor convergence of the model could lead to catastrophic consequences. We evaluate the effectiveness of our proposed method on Windows, Ransomware, Internet of Things (IoT), and Android malware datasets using both static and dynamic analysis. For the IoT malware detection, we also present a comparative summary of the performance on an IoT-specific dataset of our proposed method and the standard stacked LSTM method. More specifically, of our proposed method achieves an accuracy of 99.1% in detecting IoT malware samples, with AUC of 0.985, and MCC of 0.95; thus, outperforming standard LSTM based methods in these key metrics.

Promoting Arbitration System in The Era of Digital Economy (디지털 경제시대의 중재제도 활성화 방안)

  • Kang Lee-Soo
    • Journal of Arbitration Studies
    • /
    • v.15 no.3
    • /
    • pp.3-25
    • /
    • 2005
  • The companies' management strategies of the electronic commerce market are different from those of the traditional market. The main difference between the electronic commerce market and the traditional market is an IT network system which is a companies' management strategies in the electronic commerce market. This study focuses on the examination and analysis of the companies' management strategies which are constituted through influence on the effectiveness of the IT network system in the electronic commerce market and Promoting Arbitration System in The Era of Digital Economy this study is to introduce several alternative policies of the Government and companies to such formated IT network system of the electronic commerce market in the future. It's also suggested that the Korean Commercial Arbitration Board (KCAB) fully cover consideration and arbitration, while KCAB for Electronic Commerce activates its proper role of consulting and ad hoc arbitration by using electronic information. E-commerce sets up the probability that its merchants and customers will not exist in the same legal jurisdictions. The confusing application of laws and wide geographical dispersion of these parties will necessitate a faster and cheaper dispute resolution methodology. Therefore, online ADR may be effective for e-commerce dispute resolution. The examples of online ADR operation are the cyber mediation of Electronic Transaction Dispute Resolution Committee, the cyber mediation of Korean Commercial Arbitration Board, the cyber mediation of Click N Settle, the online ADR of BBB online, and the cyber arbitration of virtual Magistrate. The paper points out the last one as the most desired practice. This study results are how to minimize the disputes and the method of dispute settlement. Therefore, a role of arbitration proposed and emphasized. To protect the dispute in advance, it's suggested to revise rules timely following on technical changes, and emphasized that the dispute has to lead to arbitration settlement not for consuming unnecessary time and finance for enterprises and consumers.

  • PDF

Influencing Factors in Implementing the Web-Based Cyber Education (웹기반 사이버 강의의 영향 요인 분석 연구)

  • Lee Suk-Yeol
    • Journal of Digital Contents Society
    • /
    • v.6 no.4
    • /
    • pp.235-242
    • /
    • 2005
  • This Study examines influencing factors such as input, process, and output variables on1 student's satisfaction in cyber-education. That is to study on the effectiveness of input, process, and output variables for cyber-education and how does student's interaction moderate influencing factors and student satisfaction. The study was carried out through literature and empirical study. Questionnaire was used to varify the hypothesis based on which the input-process-output with system models were established. The result of hypothesis verification in this study is as follows : First, learning hour and grade showed a positive influence on the students' satisfaction in learning factors. Second reliant of professor, recognized teaming participate, and contents showed a positive influence on the students' satisfaction in system factors. Third, an interesting findings emerged throughout the analysis, showed that process variables were rather meaning factor than input variables.

  • PDF

Development of Evaluation Criteria on Learners' Satisfaction to Increase Effectiveness of the Cyber Home Learning System (사이버가정학습 효과성 증진을 위한 학습자 만족도 평가 준거 개발)

  • Kim, Yong;Kim, JaMee;Chae, BoYoung;Kim, JungWon;Seo, JeongHee;Song, JaeShin
    • The Journal of Korean Association of Computer Education
    • /
    • v.10 no.6
    • /
    • pp.61-68
    • /
    • 2007
  • The Cyber Home Learning System(CHLS) is a representative, nationwide e-learning system specially for G1-12 in Korea. It was launched at 16 MPOE in 2005 and has been evolved through every year-its evaluation and sharing best practices. In terms of evaluation, learners' satisfaction is one of essential and indispensable factors to improve CHLS. In this research, evaluation criteria on learners's satisfaction were developed, and also, the developed evaluation criteria were verified through the process of item goodness analysis and item characteristic analysis. These evaluation criteria are expected to contribute to analysing learners' satisfaction more objectively and quantitatively.

  • PDF

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

The Effects of Professional Soldiers' Family Healthiness on Organizational Effectiveness - Mediated effect of empowerment and multi-group analysis according to whether they are living with their families or not - (직업군인의 가족건강성이 조직효과성에 미치는 영향 -임파워먼트 매개효과와 가족동거 여부별 다집단 분석-)

  • Kim, Jung-Eun;Chae, Hyun-Tak
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.146-152
    • /
    • 2016
  • The purposes of this study were to investigate the effects of professional soldiers' family healthiness on the organizational effectiveness of the military and test for any differences in the structural modeling path caused by the mediating effects of empowerment depending on whether they lived with their families or not. Data were collected with a self-administered survey distributed to 480 professional soldiers after the approval of the Ministry of National Defense. The data collected were then analyzed using descriptive statistics, structural equation modeling, and multi-group analysis. The analysis results show that the family healthiness of all of the professional soldiers had direct or indirect effects on their organizational effectiveness via empowerment and that family healthiness was a variable with a very large explanatory power for organizational effectiveness. Both family healthiness and empowerment had effects on the organizational effectiveness of the solders that were living with their families and those who lived separately from their families. The levels of family healthiness, empowerment, and organizational effectiveness were all high among the professional soldiers that were living with their families and all low among those who were not. Increasing the family healthiness and empowerment was found to enhance the organizational effectiveness in all of the models, and a higher organizational effectiveness would be expected from professional soldiers living with their families. These findings led to a proposal that various plans should be prepared to help professional soldiers live with their families and provide them with family welfare support.

Evaluation Methodology of Diagnostic Tool for Security Weakness of e-GOV Software (전자정부 소프트웨어의 보안약점 진단도구 평가방법론)

  • Bang, Jiho;Ha, Rhan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.4
    • /
    • pp.335-343
    • /
    • 2013
  • If the SW weaknesses, which are the main cause of cyber breaches, are analyzed and removed in the SW development stages, the cyber breaches can be prevented effectively. In case of Domestic, removing SW weaknesses by applying Secure SDLC(SW Development Life Cycle) has become mandatory. In order to analyze and remove the SW weaknesses effectively, reliable SW weakness diagnostic tools are required. Therefore, we propose the functional requirements of diagnostic tool which is suitable for the domestic environment and the evaluation methodology which can assure the reliability of the diagnostic tools. Then, to analyze the effectiveness of the proposed evaluation framework, both demonstration results and process are presented.

A Study of Improved Session Management for Mobile Web under BYOD environment (BYOD 환경을 고려한 모바일 웹을 위한 세션 관리 개선 방안 연구)

  • Kim, Young-hun;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1117-1124
    • /
    • 2015
  • This paper explains a web session management system for mobile web environment with BYOD(Bring Your Own Device). This system operates by enhanced secure session token. This system consists of an unique identifier, time stamp, and encryption algorithm. The Unique identifier in this system classifies each mobile device for web security based on mobile environment with BYOD. And the Time stamp in this system that determine session effectiveness for web security. Also the Cipher algorithm in this system that protects session token information for web security. This paper analysis a security of session management system running on mobile web environment using the simulation techniques. The proposed method is more suitable than the other methods under enviroment mobile web environment with BYOD.

The Impact of Achievement Motivation on Academic Achievement and Satisfaction of Adult Learners in an e-Learning Environment

  • HA, Young-Ja;CHUNG, Se-Jin
    • Educational Technology International
    • /
    • v.7 no.1
    • /
    • pp.59-79
    • /
    • 2006
  • The purpose of this study is to measure the impact of motivation on academic achievement and satisfaction of adult learners in an e-Learning environment, and to come up with strategies to improve the effectiveness of e-Learning for adult learners. In order to find answer, devices were developed, tested for validity and reliability, and use for testing variables for 289 adult learners. To measure the impact of achievement motivation on learning in job training, a multiple regression analysis was performed. The analysis results show that achievement motivation has an impact on academic achievement with significance level .001, but does not have an impact on a learner's satisfaction. Further analyses on the subcategories of achievement motivation show that individual-oriented motivation affects achievement with significance level of .001, while social-oriented motivation does not. From this finding, some strategies to boost individual-oriented motivation are suggested to enhance effectiveness of job training in e-Learning environment. Further strategies to boost individual-oriented motivation should be developed by studying various aspects of e-Learning such as learning environments, learning culture, learning modes and methods, and evaluation.