• Title/Summary/Keyword: Cyber-space

Search Result 474, Processing Time 0.023 seconds

A Study on the Website Design applied to WDS(Web Identity Development System) (WIDS(Web Identity Development System)을 적용한 웹사이트디자인 개발에 관한 연구)

  • 정철종
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.1
    • /
    • pp.77-85
    • /
    • 2002
  • It has been a well known fact that the Internet as a information media has became a obvious ISDN(Integrated Services Digital Networks) through ultra speed information networks. Internet has mads a great change in educational fields. The educational systems are being changed into a learner central figure from the professor central one and cyber universities regardless of space and distance have appeared though the Internet. Accordingly in this paper, we present the web site of UC(Ulsan College) applied to WIDS(Web Identity Development System) to supply the enhancement of information services and the interface design of user's convenience in rapid changing educational environment. We suggest the more enhanced methodology of web site development in cyber space through the case of UC web site development.

  • PDF

Future Cyber Information Warfare (사이버 정보전 준비 해야)

  • 오제상
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.31-35
    • /
    • 2001
  • Currently if we are to make a thought to depend on our fast developing information technology, a future war is necessarily to be made a situation of a cyber information warfare. A attacker in the cyber information warfare is able to make attack a military or a civil information and communication system, especially if a attack of a hacker, a virus or a electromagnetic pulse bomb at a military C4ISR system is able to make a confusion or a interruption in military operations, they are available to attack as a real time with non restrictions of physical distance, time, weather and space. While a expenditure of carrying out the cyber information warfares is the lowest expenditure, a effect of carrying out the cyber information warfares is the greatest effect in side of a interruption of information, a confusion, a terror, a pillage and crime of the people. This paper is to introduce "weapons of cyber information warfares", "offence capability of cyber information warfares about several nations" and to propose "a cyber information warfare organization" or the future knowledge warfare. the future knowledge warfare.

  • PDF

A Study on the Influence of Learning Style and Instructional Method in Cyber-home Learning (사이버가정학습에서 학습 스타일과 교육 방법이 미치는 효과성 연구)

  • Han, Hee-Seop;Han, Seon-Gwan
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.1
    • /
    • pp.81-89
    • /
    • 2011
  • Cyber-home Learning aims to extend learning space from the classroom to real-life situations, and teachers of research schools on Cyber-home learning have indicated the importance of connection with school instruction in order to improve students' performance. The goal of this study is to evaluate the influence of the instructional method( blended-learning vs just cyber learning) and the learning styles by Kolb's LSI on Cyber-home learning. We carried out the experiment using two similar classes in the social and math subjects for 1 semester. The results statistically shows the instructional method is the most influence on learning score and the next element is the learning styles. Therefor this study proved again Cyber-home learning is effective when connecting with school instruction and also the more various contents on learning styles could be supportive to students. In other words teacher's role and the adaptive learning contents by learning styles are essential for Cyber-home Learning's success.

  • PDF

Suggestions for Business Cooperation Utilizing the Cyber Culture Trends between Korea and China (한중 사이버 문화 협력과 비즈니스 발전방안)

  • Park, Moon-Suh
    • International Commerce and Information Review
    • /
    • v.7 no.1
    • /
    • pp.261-282
    • /
    • 2005
  • In the 21st century, both globalization and e-Transformation trends of business in China have been in progress simultaneously and very rapidly. Due to those phenomena, there is consequently big change not only in the field of political-economy but also in the cultural trend of the world. But, despite of the importance of mutual cooperation between Korea and China, the research about Chinese cyber culture is neglected relatively. The purpose of this study is to review the cyber cultural aspect of business between two countries, and to devise proper measures for cultural cooperation not only reengineering the role of two countries but developing mutual benefit in East Asia in the era of global competition. The methodology used in this study is basically depending on theoretical study. Major findings are as follows: China has some cyber-cultural characteristics like very big size of netizen, heaven on earth of counterfeit, deepening in digital divide, etc. And Chinese traditional off-line culture has changed as the cyber culture spreaded over in cyberspace recently. But, on the other hand, cultural trends are changed to homogeneity both in nation-side which is between Korea and China and in space-side which is between online and offline culture. It is recommended that Korea and China have to endeavor to understand mutual culture, and to utilize the cyber culture in the respect of business cooperation. Consequently, two countries should effort to prepare exchange program for both netizen group, to design culture-networking system, to strengthen cyber-cultural marketing, and to make good use of both Korean Cultural Wave(said Han-Ryu) and Chinese Cultural Wave(said Hwa-Ryu).

  • PDF

Cyber In-Service Training Contents Development Regarding Environmental Literacy for Entry-Level Environmental Public Servants (신임환경공무원을 위한 환경소양 사이버 연수 콘텐츠 개발)

  • Seo, Woo-Seok;Kim, Su-Wook;Kim, Jae-Ho;Lee, Yoon-Jo
    • Hwankyungkyoyuk
    • /
    • v.21 no.2
    • /
    • pp.25-39
    • /
    • 2008
  • The purpose of the study was to develop cyber in-service training contents regarding environmental literacy for entry-level environmental public servants. The blended type of contents were developed, through literature review, contents analysis of other programs, and expert conferences. The validity of the contents developed was ensured experts in environment. Major research findings were as followings: First, there is a lack of time for entry-level environmental public servants to participate in the environmental in-service training programs. Therefore, cyber training can be a good solution to the problems with environmental training courses. It improves access to educational opportunities as it overcomes the limitations of time and space and provides hands-on experiences through multimedia materials that reflect the real world. Second, directions for developing cyber environmental education contents were represented in three parts; 1) strategies for developing cyber environmental education contents, 2) Models for developing cyber environmental education contents, 3) Contents selection for developing cyber environmental education contents Third, the developed contents for entry-level environmental officers consist of 4 domains: (1) the introduction to environment; (2) the natural scientific understanding of environment; (3) the humanistic understanding of environment; and (4) the social scientific understanding of environment. Fourth, the program developed was evaluated by 7 environmental education experts according to 10 evaluation items of total contents and contents development structure. In result, the validity of the program was ensured. Based on the results, some recommendations were suggested.

  • PDF

Overcoming Cybercrime in Ukraine (Cyberterrorism)

  • Pravdiuk, Andrey;Gerasymenko, Larysa;Tykhonova, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.181-186
    • /
    • 2021
  • Ensuring national security in cyberspace is becoming an increasingly important issue, given the growing number of cybercrimes due to adaptation to new security and protection technologies. The purpose of this article is to study the features of counteracting, preventing, and detecting crimes in the virtual space of Ukraine on the example of cases and analysis of the State Center for Cyber Defense and Countering Cyber Threats CERT-UA and the Cyber Police Department of the National Police of Ukraine. The research methodology is based on the method of analysis and study of cases of crime detection in the virtual environment of the State Center for Cyber Defense and Countering Cyber Threats CERT-UA and the Cyber Police Department of the National Police of Ukraine. The results show that the consistent development of the legal framework in 2016-2020 and the development of a cyber-defense strategy for 2021-2025 had a positive impact on the institution-building and detection of cybercrime in Ukraine. Establishing cooperation with developed countries (USA) has helped to combat cybercrime by facilitating investigations by US law enforcement agencies. This means that international experience is effective for developing countries as a way to quickly understand the threats and risks of cybercrime. In Ukraine, the main number of incidents concerns the distribution of malicious software in the public sector. In the private sector, cyber police are largely confronted with the misappropriation of citizens' income through Internet technology. The practical value of this study is to systematize the experience of overcoming cybercrime on the example of cases of crime detection in a virtual environment.

Detecting Cyber Threats Domains Based on DNS Traffic (DNS 트래픽 기반의 사이버 위협 도메인 탐지)

  • Lim, Sun-Hee;Kim, Jong-Hyun;Lee, Byung-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.11
    • /
    • pp.1082-1089
    • /
    • 2012
  • Recent malicious attempts in Cyber space are intended to emerge national threats such as Suxnet as well as to get financial benefits through a large pool of comprised botnets. The evolved botnets use the Domain Name System(DNS) to communicate with the C&C server and zombies. DNS is one of the core and most important components of the Internet and DNS traffic are continually increased by the popular wireless Internet service. On the other hand, domain names are popular for malicious use. This paper studies on DNS-based cyber threats domain detection by data classification based on supervised learning. Furthermore, the developed cyber threats domain detection system using DNS traffic analysis provides collection, analysis, and normal/abnormal domain classification of huge amounts of DNS data.

Fish Schooling Behavior Simulator for the Contents Production of Cyber Underwater Environment (가상 해저 환경 콘텐츠 제작을 위한 Fish 군중행동 시뮬레이터)

  • Kim, Jong Chan;Cho, Seung Il;Kim, Eung Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.1 no.1
    • /
    • pp.27-35
    • /
    • 2006
  • Crowd behaviors on cyber underwater environment are often produced in entertainment contents, such as films and games. It is easy for us to come in contact with the scenes appearing a lot of characters as digital films and animation works are increased gradually, owing to developing of computer graphics. Though the processing a scene of crowd and the behavior system of crowd, related to the processing techniques of crowd behavior in cyber space, have been implemented so far, the research for developing the natural crowd behavior simulator can not be still satisfying. In this paper, we designed a realistic and efficient Fish Schooling Behavior Simulator for the contents production of cyber underwater environment, which showed each type of fish behavior in cyber underwater smartly, and which generated the animating the behavior automatically, reducing the time and cost.

  • PDF

A Study of Backtracking of IPs and LINK Joints loaded with Stealth Functions (Stealth 기능을 탑재한 LINK관절 IP역추적 방법)

  • Yoo, Jae-Won;Park, Dae-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.165-168
    • /
    • 2013
  • The USA has declared the cyber space as the 5th battlefield following land, sea, air, and space. In contrast to physical wars, in national cyberwarfare differentiation between friend and foe is impossible, and the boundaries between the lines of attack and defense are obscure. Therefore, to perform national cyberwarfare, credibility of all command delivery information performed in the cyber space should be confirmed. In this paper, the authors have determined the commands performed in national cyberwarfare, granted authorized IPv6 in space including the earth, moon and Mars for information credibility, and used LINK joints loaded with stealth functions to secure the credibility of command information.

  • PDF

An Educational Service Platform using Collective Intelligence and Presence of Web 2.0

  • Kim, Chang-Suk;Son, Dong-Cheul;Cho, Chung-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.1
    • /
    • pp.115-121
    • /
    • 2009
  • Web 2.0 has become the face next generation Web among the business world and research community. Web 2.0 is instant superficial gratification of people. On the other hand, Semantic Web is deep, meaningful and lasting relationship with data. So, it is difficult to apply the Semantic Web to the real world. In this paper, a platform for educational services using the Semantic Web and Web 2.0 is proposed. The proposed platform is based mix of the Semantic Web and Web 2.0, so it is useful to apply in the real world applications. Two services are presented, one is a semantic email system and the other is a cyber study space. The cyber study space adjusted each student is presented. The study environment is called iStudySpace that has personal scheduler, study status plan table, personalized search engine and several gadgets. Finally characteristics and limitations of the Semantic Web and Web 2.0, the organization and components of the platform, evaluation of iStudySpace are shown.