• Title/Summary/Keyword: Cyber-Spaces

Search Result 33, Processing Time 0.062 seconds

A Study on Improving the Visibility of Cyber Spaces for Cyber Businesses (사이버비즈니스를 위한 사이버공간의 가시성 증진에 관한 연구)

  • Choi, S.I.
    • Smart Media Journal
    • /
    • v.1 no.1
    • /
    • pp.80-83
    • /
    • 2012
  • This paper deals with the problems that entrepreneurs are facing while launching the cyber businesses. They are afraid of getting into cyber spaces due to the lack of visibilities. This paper adopts the relation concept in the mathematics to improve the visibility of cyber spaces. This research shows the competitiveness in cyber businesses comes from the clear understanding of visibility and reliability problems naturally embodied in the cyber space.

  • PDF

A Study on the Development of the Cyber Ethic Educational Program Establishing Program for Establishing Cultural Framework in Cyber Spaces (건전한 사이버문화 형성을 위한 사이버 윤리교육 프로그램개발을 위한 기초연구)

  • 장진경
    • Journal of the Korean Home Economics Association
    • /
    • v.39 no.12
    • /
    • pp.15-35
    • /
    • 2001
  • This research aims to investigate the casual effects of not only the level of ethic awareness in general among internet users but also the level of internet skills on inadequate behaviors in cuber spaces. This research also try to develop the framework for the cyber ethic educational program in order to establishing adequate attitudes in cuber spaces. For accomplishing the purposes of this research, the data, 522, had been collected from both on-line and off-line. The major statistical methods for data analysis were frequency, factor analysis, multiple regression, and path analysis. The results of this casual effect analysis were as follows: 1. There were positive direct causal effects of sex, occupation, place for internet use, and internet skills on inadequate behaviors in cuber spaces. On the other hand, the negative casual effect of the awareness of legal ethics on inadequate behaviors in cuber spaces. 2. Such variables as sex, age, internet-related and the awareness of ethics in general had indirect causal effects on the inadequate behaviors in cuber spaces through the variable which is the awareness of cyber ethics. The implications of this findings were discussed.

  • PDF

A Road-map for an e-Commerce Development (전자상거래 발전 로드맵 모델)

  • Choi, Se-Ill
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.4
    • /
    • pp.897-904
    • /
    • 2012
  • This paper proposes a road-map from entering into the cyber spaces to getting to the success of cyber businesses. In order to succeed in cyber businesses, the nature of cyber space, attributes of the businesses and circumstances of the business owner have to be integrated and resolved. This road-map consists of integrated stepwise phases of understanding cyber spaces and developing cyber businesses.

Visualization of the Cyber Space for e-Businesses (E-비즈니스를 위한 사이버 공간의 이해)

  • Choi, Se-Ill
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.6
    • /
    • pp.957-963
    • /
    • 2011
  • This paper proposes a way to visualize the cyber space with respect to the offline space. In general, people have difficulties to understand the cyber space since it is not tangible and not visible. In businesses, both spaces depend on identical proposition of "salse of merchandise goods to customers". Here, 3 merchandise elements of "customers", "merchandise goods" and "salse" in the cyber space are compared to them in the offline spaces in order to visualize the cyber space in terms of businesses.

Efficient countermeasures against e-terrorism (e-테러리즘의 효율적 통제방안)

  • Lee, Yoon-Ho;Kim, Dae-Kwon
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.271-289
    • /
    • 2009
  • In e-terrorism, terrorists use cyber spaces including the internet in order to strike terror into the heart of a nation. It is revealed that recently happening terror cases use cyber spaces as a strategic tool. This research aims to investigate efficient countermeasures against various types of terror attacks made by terrorists and their cyber networking, in order to contribute to the prevention of terrors from a modern standpoint. Based on the results of the investigation, relevant problems are suggested such that terrors are not cases happening in a specific country only because they take place in cyber spaces, that hacking incidents frequently happen in Korea which is used as a footstool by foreign hackers, and that Korea has poor professional security manpower and foundational facilities in comparison with other advanced countries. Answers to the problems include cultivating cyber information manpower to cope with e-terrorism, making an appropriate budget, setting up networks to integrate and systematize anti-e-terrorism organizations, and intensifying the collection of information of cyber attacks and the analysis of the information.

  • PDF

A Study of Reinforcement Learning-based Cyber Attack Prediction using Network Attack Simulator (NASim) (네트워크 공격 시뮬레이터를 이용한 강화학습 기반 사이버 공격 예측 연구)

  • Bum-Sok Kim;Jung-Hyun Kim;Min-Suk Kim
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.3
    • /
    • pp.112-118
    • /
    • 2023
  • As technology advances, the need for enhanced preparedness against cyber-attacks becomes an increasingly critical problem. Therefore, it is imperative to consider various circumstances and to prepare for cyber-attack strategic technology. This paper proposes a method to solve network security problems by applying reinforcement learning to cyber-security. In general, traditional static cyber-security methods have difficulty effectively responding to modern dynamic attack patterns. To address this, we implement cyber-attack scenarios such as 'Tiny Alpha' and 'Small Alpha' and evaluate the performance of various reinforcement learning methods using Network Attack Simulator, which is a cyber-attack simulation environment based on the gymnasium (formerly Open AI gym) interface. In addition, we experimented with different RL algorithms such as value-based methods (Q-Learning, Deep-Q-Network, and Double Deep-Q-Network) and policy-based methods (Actor-Critic). As a result, we observed that value-based methods with discrete action spaces consistently outperformed policy-based methods with continuous action spaces, demonstrating a performance difference ranging from a minimum of 20.9% to a maximum of 53.2%. This result shows that the scheme not only suggests opportunities for enhancing cybersecurity strategies, but also indicates potential applications in cyber-security education and system validation across a large number of domains such as military, government, and corporate sectors.

  • PDF

The Survey for the Effectiveness of Cyber Lecture′s Main Components (사이버 강좌 주요 구성 요소의 효율적인 구현에 대한 수강생들의 반응조사)

  • 조세홍;엄종석;황대훈
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.4
    • /
    • pp.542-549
    • /
    • 2004
  • As a promising alternative for the traditional educational system, the cyber education is in the spotlight of both educators and computer scientists. There are many advantages of online education to the students and to the institution such as easy and random accessibility, low cost, saving spaces in the institutions, and so on. or a successful online education, some important factors would be considered in constructing cyber lectures. The purposes of this paper are to investigate students'viewpoints, called factors, of the cyber class and analyze these factors to be an effective cyber class. Once factors are identified, we trace the change of the student assessments on the identified factors during the class. Using these factors, we also examine if there are any differences on the assessment of the cyber class according to student background, such as gender. major, and class.

  • PDF

Empirical study of impression dimensions in 3D cyber space : Comparison research between 2D cyber space and 3D cyber space (3D 가상공간에서의 인상 차원에 관한 연구 -2D 기반과 3D 기반의 가상공간에서의 인상차원 비교-)

  • Lee, Su-Jung;Kim, Hee-Sun;Park, Su-E
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.1218-1224
    • /
    • 2009
  • Today, 3D cyber space with advancements of 3D technique is changing into a social space. As such, the users want to make social relationships, the impression that one leaves in 3D cyber space has become more important. This study will advance impression dimensions in 3D cyber space that formed each impression dimensions in pre-study with cyber space based on web sites. As this study analyzes the characteristic elements of 3D cyber space which are differentiated with other platform, it has theoretical value to support theory about personal relationship in3D cyber spaces. Then it will be a supporting theory for next study about intercultural and social phenomena in changeable 3D cyber space as advancement of technique.

  • PDF

Empirical study of impression formation factors in 3D cyber space : Analysis focused on Second Life (3D 가상공간에서의 인상 형성에 관한 실증적 연구 : 세컨드 라이프를 중심으로 인상 형성 요인 분석)

  • Kim, Hee-Sun;Lee, Jae-Hee;Jang, Su-Jin;Park, Su-E
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.513-520
    • /
    • 2008
  • Today, 3D cyber space with advancements of Web 3D technique is changing into a social space. As such, the users want to make social relationships, the impression that one leaves in 3D cyber space has become more important. This study will be confirm a relationship between interpersonal relations and impression and show some impression formation factors in 3D cyber space. As this study analyzes the characteristic elements of 3D cyber space which are differentiated with other platform, it has theoretical value to support theory about personal relationship in3D cyber spaces. Then it will be a supporting theory for next study about intercultural and social phenomena in changeable 3D cyber space as advancement of technique. We will find out the causal relationship between impression dimensions and formative factors in next study.

  • PDF

Analysis of Cyber Crime and Its Characteristics (사이버범죄 유형별 특징 분석 연구)

  • So-Hyun Lee;Ilwoong Kang;Yoonhyuk Jung;Hee-Woong Kim
    • Information Systems Review
    • /
    • v.21 no.3
    • /
    • pp.1-26
    • /
    • 2019
  • Now we are facing with a possibility of having crimes, which have been only possible offline, in cyber spaces as well.Especially, a recent growth in the use of SNS, promoted by popularization of smart phones, also has led an abrupt increase in cyber crime. It would be important to have a understanding of cyber crime and its characteristics by type as well as factors associated with each type of cyber crime in order to devise appropriate preventive measures against cyber crime. However, most of the previous studies on cyber crimesolely made through literature review or indirect approaches. Therefore, this study has been designed to conduct the interview with actual suspects(criminals) of cyber crime to address factors of cyber crime and to devise specific preventive measures and countermeasures against cyber crime. Especially, among various types of cyber crime, this study aims at addressing the 'trades' and 'financial transaction' of crimes committed using the information and communication network and the 'cyber libel/insult'of crimes committed using unlicensed contents, which have been soared recently and become significant issues. The findings of this study could be beneficial for the society since it has managed to conduct the interview and reveal relationships among major factors of cyber crime. The findings of this study could be used for devising and developing proper preventive and countermeasures against cyber crime, in turn reducing and preventing its damage.