• Title/Summary/Keyword: Cyber experience

Search Result 238, Processing Time 0.058 seconds

A Cyber-Training & Education Model for Tug-barge Operators

  • Lee, Eun-Bang;Yun, Jong-Hwui;Jeong, Tae-Gweon
    • Journal of Navigation and Port Research
    • /
    • v.34 no.4
    • /
    • pp.287-292
    • /
    • 2010
  • The purpose of this study was to create a cyber-training & education program in response to the needs of skippers and crews operating tug-barges within Korean coastal waters and the rapid changers in this industry. Skippers and crews are inclined to operate tug-barges on the basis of experience rather than information. It is not easy to provide useful information whenever they want or to drill them in safety management skills, because of their passive attitude toward education and the few opportunities that exist. In order to increase educational opportunities, efficiency and motivation, the authors have developed this program which consists of a 'tug bridge resource management module, risk perception training module, accident case module, operating module and navigation module', and are hoping that this program will enhance and strengthen all tug-barge operations. We are also putting all our energies into designing up to date animation programs and developing new scenarios concerning the method of evaluation and certification distribution.

Effects of Cyber Defamation Victims' Post-Traumatic Stress on Coping behaviour : Focusing on the Theory of Reasoned Action (사이버 명예훼손 피해자의 외상 후 스트레스가 대처행동에 미치는 영향 : 합리적 행동 이론을 중심으로)

  • Kim, Youngsoo;Byun, Sanghae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.1
    • /
    • pp.29-41
    • /
    • 2019
  • The purpose of this study examined how post-traumatic stress, caused when internet users in web portal or social media are defamed in cyberspace, influence on coping behaviour, through the Theory of Reasoned Action's two major factors: Attitude on behaviour and subjective norm. In so doing, it aims to provide a technical and political solution that would fundamentally prevent future victims in cyberspace. In an effort to examine its research theory, a survey was conducted on people who have had the experience of being defamed in cyberspace. The results showed, first, hypersensual has no significant influence over attitude on behaviour and subjective norm. Second, intrusion has no significant influence over attitude on behaviour and subjective norm. Third, avoidance showed significant influence over attitude on behaviour and subjective norm. Fourth, attitude on behaviour and subjective norm showed significant influence on behaviour. This study has both theoretical and practical significance; Unlike previous studies on cyber defamation with qualitative research method, this study employed quantitative method through theory-based approach. In other words, the researcher did not arbitrarily set variables, but utilized the Theory of Reasoned Action for examination.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Research about digital contents development of internal culture relics (국내 문화유적의 디지털콘텐츠 개발에 관한 연구)

  • Kim, Moon Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.147-154
    • /
    • 2009
  • There are not much digital contents researches that do to culture relics basically. Digital contents research is studied by various method such as Cyber Gallery, 3-D Graphics, Hologram from Scanning that is the simplest form. This research wishes to do with internal culture relics as the central figure that it is that 'Sosu Seowon'. Korean culture contents cyber gallery construction can see as childhood yet. Present result that investigator develops research and as presentation about research process and contents result, wish to argue about problem. Digital contents escapes in existent physical time factor and development to new culture code is possible. Go and come often carrying out and search of fast data or experience of cultural inheritance is available. Through research, wished to present possible metheod actually in digital contents manufacture of internal cultural inheritance. Through this, expect role that offer base in contents manufacture skill.

A Study on the Usability test and Space Syntax analysis in Web Museum (Museum Web 공간의 사용성 평가와 구조분석에 관한 연구)

  • 최성욱;황미영;임채진
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2002.04a
    • /
    • pp.99-104
    • /
    • 2002
  • The main concept of this thesis is to research about how to express the interface element of the virtual museum on tile cyber space and how to evaluate its organization. In addition, the basis of this thesis is to help people build their efficient spaces on the current virtual museum. My understanding about the interface element and its structural evaluation is grounded on Usability evaluation and Syntax thesis. For the survey, I utilize two different methods. One is regular questionnaire; the other is heuristic evaluation which is derived from empirical study and practical experience. The survey is mainly composed of contents, design, usability and overall impression. The main concept of this research is to establish the initial foundation of the virtual museum on cyber space by suggesting an objective evolutional norm including esthetic orientation.

  • PDF

Predicting the Saudi Student Perception of Benefits of Online Classes during the Covid-19 Pandemic using Artificial Neural Network Modelling

  • Beyari, Hasan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.145-152
    • /
    • 2022
  • One of the impacts of Covid-19 on education systems has been the shift to online education. This shift has changed the way education is consumed and perceived by students. However, the exact nature of student perception about online education is not known. The aim of this study was to understand the perceptions of Saudi higher education students (e.g., post-school students) about online education during the Covid-19 pandemic. Various aspects of online education including benefits, features and cybersecurity were explored. The data collected were analysed using statistical techniques, especially artificial neural networks, to address the research aims. The key findings were that benefits of online education was perceived by students with positive experience or when ensured of safe use of online platforms without the fear cyber security breaches for which recruitment of a cyber security officer was an important predictor. The issue of whether perception of online education as a necessity only for Covid situation or a lasting option beyond the pandemic is a topic for future research.

Education in Cyberspace: University as Universality

  • Shapoval, Oksana;Kotlyaria, Svitlana;Medvedieva, Alla;Lishafai, Oleksandr;Barabash, Oleh;Oleksyuk, Oksana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.333-337
    • /
    • 2021
  • The article reveals the essence of cyber socialization influencing the process of education and development. The general and potential possibilities of cyber socialization in the process of using the cyberspace of the Internet environment are presented. The sudden transition to distance learning in the spring of 2020 put the pedagogical community in the face of problems related to the content, organizational and methodological basis of the educational process. During the training in distance mode, a rich experience was gained in the use of information and communication technologies. The article discusses the techniques and methods of teaching using the capabilities of information and communication and digital technologies.

A Study on Scenario-based Web Application Security Education Method

  • Gilja So
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.149-159
    • /
    • 2023
  • Web application security education that can provide practical experience is needed to reduce damage caused by the recent increase in web application vulnerabilities and to strengthen security. In this paper, we proposed a scenario-based web application education method, applied the proposed method to classes, and analyzed the results. In order to increase the effectiveness of scenario-based education, a real-life practice environment to perform scenarios and instructions to be performed by learners are needed. As an example of the proposed method, instructions to be performed by learners from the viewpoint of the attacker and the victim were shown in a practice environment to teach XSS and SQL injection vulnerabilities. After applying the proposed method to the class for students majoring in cyber security, when the lecture evaluation results were analyzed, it was shown that the learner's interest, understanding, and major ability all improved.

Behavioral Analysis Zero-Trust Architecture Relying on Adaptive Multifactor and Threat Determination

  • Chit-Jie Chew;Po-Yao Wang;Jung-San Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2529-2549
    • /
    • 2023
  • For effectively lowering down the risk of cyber threating, the zero-trust architecture (ZTA) has been gradually deployed to the fields of smart city, Internet of Things, and cloud computing. The main concept of ZTA is to maintain a distrustful attitude towards all devices, identities, and communication requests, which only offering the minimum access and validity. Unfortunately, adopting the most secure and complex multifactor authentication has brought enterprise and employee a troublesome and unfriendly burden. Thus, authors aim to incorporate machine learning technology to build an employee behavior analysis ZTA. The new framework is characterized by the ability of adjusting the difficulty of identity verification through the user behavioral patterns and the risk degree of the resource. In particular, three key factors, including one-time password, face feature, and authorization code, have been applied to design the adaptive multifactor continuous authentication system. Simulations have demonstrated that the new work can eliminate the necessity of maintaining a heavy authentication and ensure an employee-friendly experience.

Hypofractionated stereotactic body radiotherapy in low- and intermediate-risk prostate carcinoma

  • Kim, Hun Jung;Phak, Jeong Hoon;Kim, Woo Chul
    • Radiation Oncology Journal
    • /
    • v.34 no.4
    • /
    • pp.260-264
    • /
    • 2016
  • Purpose: Stereotactic body radiotherapy (SBRT) takes advantage of low ${\alpha}/{\beta}$ ratio of prostate cancer to deliver a large dose in few fractions. We examined clinical outcomes of SBRT using CyberKnife for the treatment of low- and intermediate-risk prostate cancer. Materials and Methods: This study was based on a retrospective analysis of the 33 patients treated with SBRT using CyberKnife for localized prostate cancer (27.3% in low-risk and 72.7% in intermediate-risk). Total dose of 36.25 Gy in 5 fractions of 7.25 Gy were administered. The acute and late toxicities were recorded using the Radiation Therapy Oncology Group scale. Prostate-specific antigen (PSA) response was monitored. Results: Thirty-three patients with a median 51 months (range, 6 to 71 months) follow-up were analyzed. There was no biochemical failure. Median PSA nadir was 0.27 ng/mL at median 33 months and PSA bounce occurred in 30.3% (n = 10) of patients at median at median 10.5 months after SBRT. No grade 3 acute toxicity was noted. The 18.2% of the patients had acute grade 2 genitourinary (GU) toxicities and 21.2% had acute grade 2 gastrointestinal (GI) toxicities. After follow-up of 2 months, most complications had returned to baseline. There was no grade 3 late GU and GI toxicity. Conclusion: Our experience with SBRT using CyberKnife in low- and intermediate-risk prostate cancer demonstrates favorable efficacy and toxicity. Further studies with more patients and longer follow-up duration are required.