• Title/Summary/Keyword: Cyber language

Search Result 141, Processing Time 0.027 seconds

Influence of Cyber Language on Continue Using Intention of Mobile (사이버 언어가 모바일 지속적 사용의도에 미치는 영향)

  • Nam, Soo-Tai;Kim, Do-Goan;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.178-181
    • /
    • 2015
  • The purpose of this study was aimed to analyze factors affecting on continuous intention to use of mobile based on the caused motivation of cyber language. Predictor factors were selected economic motivation, represent motivation, entertainment motivation, relationship strength motivation and psychological free motivation suggested on the previous study. Participants of this study were 76 mobile users in Gyeongnam and Jeonbuk province in accordance with convenience sampling. IBM SPSS Statistics 19 were employed for descriptive statistics, Smart PLS(partial least squares) was employed for confirmatory factor analysis and path analysis of casual relationship among variables and effect. Analytical results show that paths from economic motivation to the percieved value and relationship strength motivation are significant. And analytical results show that path from economic motivation to the percieved risk are significant. This study suggests practical and theoretical implications based on the results.

  • PDF

An Enhanced Text Mining Approach using Ensemble Algorithm for Detecting Cyber Bullying

  • Z.Sunitha Bai;Sreelatha Malempati
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.1-6
    • /
    • 2023
  • Text mining (TM) is most widely used to process the various unstructured text documents and process the data present in the various domains. The other name for text mining is text classification. This domain is most popular in many domains such as movie reviews, product reviews on various E-commerce websites, sentiment analysis, topic modeling and cyber bullying on social media messages. Cyber-bullying is the type of abusing someone with the insulting language. Personal abusing, sexual harassment, other types of abusing come under cyber-bullying. Several existing systems are developed to detect the bullying words based on their situation in the social networking sites (SNS). SNS becomes platform for bully someone. In this paper, An Enhanced text mining approach is developed by using Ensemble Algorithm (ETMA) to solve several problems in traditional algorithms and improve the accuracy, processing time and quality of the result. ETMA is the algorithm used to analyze the bullying text within the social networking sites (SNS) such as facebook, twitter etc. The ETMA is applied on synthetic dataset collected from various data a source which consists of 5k messages belongs to bullying and non-bullying. The performance is analyzed by showing Precision, Recall, F1-Score and Accuracy.

XML Converter Design and Implementation for OCIL based Security Level Evaluation (OCIL기반 보안수준평가를 위한 XML Converter 설계 및 구현)

  • Kim, Jongmin;Kim, Sang-Choon
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.29-35
    • /
    • 2020
  • The cyber attacks targeting the systems of national and public organizations in the front line of cyber security have been advanced, and the number of cyber attacks has been on the constant rise. In this circumstance, it is necessary to develop the security evaluation technology to prevent cyber attacks to the systems of national and public organizations. Most of the studies of the vulnerability analysis on the information systems of national and public organizations almost focus on automation. In actual security inspection, it is hard to automate some parts. In terms of security policies for threats, many different plans have been designed and applied in the managerial, physical, and technical fields, giving particular answers no matter how they are subjective or situational. These tendencies can be standardized in OCIL(Open Checklist Interactive Language), and partial automation can be achieved. Therefore, this study tries to implement XML Converter in order for OCIL based security level evaluation with typical evaluation questions.

Development of Conversion Smart Monitoring App for Elementary School Student (초등학생을 대상으로 한 융복합 스마트 안전지킴이 앱 개발)

  • Cho, Han-Jin;Kim, Jin-Mook
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.211-217
    • /
    • 2015
  • Recently, school violence problem has increased serious. And this is not only an individual issue but also this is a social problem. Realistically, not only physical violence, cyber violence using the smartphone is very serious. And if the elementary school students are exposed to cyber violence, it becomes even more serious problem. Therefore, we proposed an Smart Monitoring app that protect the smart safety such as as a countermeasure against cyber violence to elementary school students. This Conversion Smart app can support grasp service for children using location based service on the smartphone when he will come to the home. And it can support another service that abuse or vulgar language in messenger. Grasps the degree of use of the language that is prohibited friendship in elementary school through this process, it can be derived. And we have future works that is the search rate and response time an inappropriate word on the proposed system.

Cyber Attack Detection Using Message Authentication for Controller Area Networks (차량 내부 네트워크에서 메세지 인증을 이용한 사이버 공격 탐지)

  • Lee, Suyun;Park, Seo-Hee;Song, Ho-Jin;Beak, Youngmi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.107-109
    • /
    • 2022
  • This paper proposes a new security system to detect cyber-attacks based on message authentication in a in-vehicle network. In the in-vehicle network, when a sending node transmits messages in a broadcast manner, it only uses a message identifier, rather than a node's identifier. It leads to a problem not identifying the source. In the proposed system, the sending node generates a message authentication code (MAC) using a cryptographic hash function to the control data and transmits it with the control data. When generating the MAC for each message, a multidimensional chaotic map is applied to increase the randomness of the result. The receiving node compares its MAC generated from the control data in the received message with the MAC of the received message to detect whether the message transmitted from the sending node is forged or not. We evaluate the performance of the proposed system by using CANoe and CAPL (Communication Access Programming Language). Our system shows a 100% of detection rate against cyber-attacks injected.

  • PDF

Cross-linguistic Study of Perceptual Cues to F0 Variations (한·중 청자의 음높이 변화에 대한 지각 연구)

  • Yoon, Eunkyung;Cao, Wenkai
    • Journal of Korean language education
    • /
    • v.28 no.3
    • /
    • pp.25-51
    • /
    • 2017
  • This study aimed to identify the differences in pitch perception between tonal and non-tonal language listeners. A total of 60 Korean and Chinese listeners participated in the perception test. A two-syllable nonsense word /paba/ was manipulated in five steps. The pitch height or contour on the second syllable was raised or lowered. Both groups were asked to select which of the two syllables had the higher pitch. The findings showed that the majority of Korean listeners (GK) perceived decreased pitch as each peak of the syllable was lowered and perceived increased pitch as it was raised, which means the pitch height is a primary perceptual cue for GK. However, Chinese listeners (GC) perceived sensitive pitch movements as the pitch contour changed. GC's perception may presumably be affected by the L1's tone sandhi. We found it reasonable to assume that language experience has a significant effect on the cross-linguistic perceptual differences between tone and non-tonal language listeners.

A Study on the Solution for the Cyber Education (사이버강좌 솔루션에 관한 연구)

  • 남상조
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.67-73
    • /
    • 2003
  • The cyber-education is fully recognized and proliferated such as to Internet language centers or virtual universities, and so on. However, the acquisition of e-learning tools as well as the construction of educational contents are quite difficult tasks. Therefore, in this study, important information for the acquisition of hardwares such as multimedia editing tools, servers, educational facilities is suggested, and the critical success factors for the acquisition of cyber educational solution softwares such as authoring tools and loaming management systems are proposed.

  • PDF

A Study on Difficulty Equalization Algorithm for Multiple Choice Problem in Programming Language Learning System (프로그래밍 언어 학습 시스템에서 객관식 문제의 난이도 균등화 알고리즘에 대한 연구)

  • Kim, Eunjung
    • The Journal of Korean Association of Computer Education
    • /
    • v.22 no.3
    • /
    • pp.55-65
    • /
    • 2019
  • In programming language learning system of flip learning methods, the evaluation of cyber lectures generally proceeds from online to multiple choice questions. In this case, the questions are randomly extracted from the question bank and given to individual learners. In order for these evaluation results to be reflected in the grades, the equity of the examination question is more important than anything else. Especially in the programming language subject, the degree of difficulty that learners think can be different depending on the type of problem. In this paper, we classify the types of multiple-choice problems into two categories, and manage the difficulty level by each type. And we propose a question selection algorithm that considers both difficulty level and type of question. Considering the characteristics of the programming language, experimental results show that the proposed algorithm is more efficient and fair than the conventional method.

The application of digital forensic investigation for response of cyber-crimes (사이버범죄의 대응강화를 위한 디지털 포렌식 수사 활용방안)

  • Oh, Sei-Youen
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.81-87
    • /
    • 2015
  • This study will show the digital forensic model which fights against cyber-crimes to prepare various cyber-crimes. The digital forensic model will be more useful about the investigation of cyber-crimes and arresting criminals after researching the uses of the digital forensic model and cyber-crime rates in South Korea. This model conduct the standardized data with various languages by the language support system through the digital forensic analyzer. This model will send the data to law enforcement reviewing whether or not we ought to prove criminal charges. Moreover, law enforcement can access the file system to find out admissibility of evidence. And this model simplifies lawful investigation about additional investigation. The data, which is conducted and saved by the digital forensic system, will be helpful to protect against the future crimes because of the data.

Detection of Depression Trends in Literary Cyber Writers Using Sentiment Analysis and Machine Learning

  • Faiza Nasir;Haseeb Ahmad;CM Nadeem Faisal;Qaisar Abbas;Mubarak Albathan;Ayyaz Hussain
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.67-80
    • /
    • 2023
  • Rice is an important food crop for most of the population in Nowadays, psychologists consider social media an important tool to examine mental disorders. Among these disorders, depression is one of the most common yet least cured disease Since abundant of writers having extensive followers express their feelings on social media and depression is significantly increasing, thus, exploring the literary text shared on social media may provide multidimensional features of depressive behaviors: (1) Background: Several studies observed that depressive data contains certain language styles and self-expressing pronouns, but current study provides the evidence that posts appearing with self-expressing pronouns and depressive language styles contain high emotional temperatures. Therefore, the main objective of this study is to examine the literary cyber writers' posts for discovering the symptomatic signs of depression. For this purpose, our research emphases on extracting the data from writers' public social media pages, blogs, and communities; (3) Results: To examine the emotional temperatures and sentences usage between depressive and not depressive groups, we employed the SentiStrength algorithm as a psycholinguistic method, TF-IDF and N-Gram for ranked phrases extraction, and Latent Dirichlet Allocation for topic modelling of the extracted phrases. The results unearth the strong connection between depression and negative emotional temperatures in writer's posts. Moreover, we used Naïve Bayes, Support Vector Machines, Random Forest, and Decision Tree algorithms to validate the classification of depressive and not depressive in terms of sentences, phrases and topics. The results reveal that comparing with others, Support Vectors Machines algorithm validates the classification while attaining highest 79% f-score; (4) Conclusions: Experimental results show that the proposed system outperformed for detection of depression trends in literary cyber writers using sentiment analysis.