• 제목/요약/키워드: cyber behavior

검색결과 250건 처리시간 0.024초

인터넷 중독과 정보윤리에 영향을 미치는 요인에 관한 연구 - 자아특성 및 인터넷 인지특성을 중심으로 (Factors Influencing Internet Addiction and Information Ethics : Centering on Self Characteristics and Cognitive Characteristics toward Internet)

  • 구본희;최무진
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제15권3호
    • /
    • pp.233-252
    • /
    • 2006
  • Recently, negative sides of internet, internet and/or game addiction and unethical behavior over internet, have been largely publicized in our society. There have been numerous studies to explore the problems and solutions, but these lack considering broader set of research variables. Therefore, this research investigated how i) internet users' self characteristics and ii) cognitive characteristics toward internet influence iii) internet addiction and iv) information ethics respectively. Especially, this study focused on college students, more mature beings than elementary, middle and high school students with whom most other researches have dealt so far. Major findings of this study are as follows: (1) Willingness to develop relationships over internet, usefulness of internet use, a degree to perceive the cyber space as real, and a degree to express self over internet have significant effects on disabled life style. Self respect willingness to develop relationships over internet, usefulness of internet use, a degree to perceive the cyber space as real, and capability of using internet have significant effects on the lack of control over internet. Willingness to develop relationships over internet, self control, and a degree to express self over internet have significant effects on the lack of control over internet. 2) Regarding the effects of independent variables(self characteristics and cognitive characteristics) on information ethics through internet addiction factors, self respect self control, a degree to perceive the cyber space as real, and capability of using internet have directly and indirectly significant effects on information ethics through internet addiction. Then we suggested four approaches to reduce the internet addiction and improve the information ethics based on the findings.

  • PDF

사이버 중독의 수학적 모델링과 비선형 거동 해석 (Mathematical Modelling and Chaotic Behavior Analysis of Cyber Addiction)

  • 김명미;배영철
    • 한국지능시스템학회논문지
    • /
    • 제24권3호
    • /
    • pp.245-250
    • /
    • 2014
  • 중독은 크게 매개체 자체가 중독성을 가진 매개성 중독과 매개체 자체가 중독성을 가진 것이 아니라 예민한 개인과 잠재된 어떤 행동과 결합하여 중독을 유발하는 유발성 중독으로 나눌 수 있다. 매개성 중독은 약물 중독, 알코올 중독과 주로 화학물질의 직접 적인 원인이 되어 중독현상을 일으킨다. 유발성 중독은 쇼핑 중독, 일 중독, 게임 중독, 인터넷 중독, TV중독, 도박 중독 등의 사이버 중독이 있다. 유발성 중독은 개인의 감수성의 문제로서 개인에 따른 편차가 존재한다. 본 논문에서는 전기 시스템의 R-L-C 직렬 회로와 기계 시스템의 Spring-Damper-Mass를 이용하여 등가적으로 동일한 2차원의 중독 모델을 제안한다. 제안한 중독 모델에 비선형 항을 추가하여 Duffing을 구성한 후 파라미터 변화에 의해 주기운동과 카오스 운동을 시계열과 위상공간으로 나타내었다. 또한 파라미터 중 통제계수의 변화에 의해 주기 운동은 중독 되기 전의 상태를 카오스 운동은 중독된 상태임을 확인하였다.

소비자안티사이트의 이용실태와 소리자권리 증진을 위한 소비자안티사이트 활성화 방안 (The Use of Consumer Anti-sites and Suggestions for Activating Consumer Anti-sites for Promoting Consumer Rights)

  • 박영미;이희숙
    • 대한가정학회지
    • /
    • 제46권3호
    • /
    • pp.103-116
    • /
    • 2008
  • With increasing of communication technology in cyber-space, the space of consumer complain behavior moved from off-line to on-line, so called anti-site. No researches, however, really have done how the anti-sites worked for promoting consumer rights through consumer complain behaviors in cyber space. The purpose of this research was to give some suggestions for activating anti-site for promoting consumer rights. For this purpose, questionnaire on-line survey was conducted from April, 12 to 24, 2004. And 143 samples, who were visiting anti-site during survey period, were selected. Main findings were as following: First, visitors had rather positive confidence with informations in anti-sites. Second, visitors thought that anti-sites were working rather well in implementing consumer movement by sharing their experiences, and by supporting complaining space in cyber. Visitors, however, thought that anti-sites were not working well as a space for companies, not by giving their attentions on consumers' complains. Third, the satisfaction level of visitors was found to be rather high in terms of informations in anti-sites, and to be rather low in terms of companies' attentions on anti-sites and management of anti-sites. Based on results, some suggestions of activating anti-site for promoting consumer rights were as following: First, visitors should not only get information, but support new and useful informations for others. And also it was suggested that visitors should join consumer movement through anti-site actively. Second, companies should pay attentions on anti-sites for their sake because anti-sites could give very useful information improving customer satisfaction, and finally reducing cost and increasing profit.

오픈소스 ELK Stack 활용 정보보호 빅데이터 분석을 통한 보안관제 구현 (Security Operation Implementation through Big Data Analysis by Using Open Source ELK Stack)

  • 현정훈;김형중
    • 디지털콘텐츠학회 논문지
    • /
    • 제19권1호
    • /
    • pp.181-191
    • /
    • 2018
  • IT발전과 함께 해킹 범죄는 지능화, 정교화 되고 있다. 침해대응에 있어 빅데이터 분석이란 정보보호 시스템에서 발생하는 정상로그 등 전체 로그를 수집, 저장, 분석 및 시각화하여 이상행위와 같은 특이점을 도출하는 것이다. 기존에 간과해왔던 데이터를 포함하는 전수 로그를 활용하여 사이버 침해의 초기단계에서부터 침해에 대한 이상 징후를 탐지 및 대응하고자 한다. 정보보호 시스템과 단말 및 서버 등에서 발생하는 비정형에 가까운 빅데이터를 분석하기 위해서 오픈소스 기술을 사용하였다. ELK Stack 오픈소스를 사용한다는 점은 해당 기관의 자체 인력으로 기업 환경에 최적화된 정보보호 관제 체계를 구축하는 것이다. 고가의 상용 데이터 통합 분석 솔루션에 의존할 필요가 없으며, 자체 인력으로 직접 정보보호 관제 체계를 구현함으로써 침해대응의 기술 노하우 축적이 가능하다.

언제 나 자신을 보호하는가? 소셜 미디어에서 온라인 성희롱에 대한 회피 동기: 위협 회피 이론을 기반으로 (When do I Protect Myself? Avoidance Motivation toward Online Sexual Harassment on Social Media: A Study Based on Threat Avoidance Theory)

  • 이서현;이새롬;곽동헌
    • 지식경영연구
    • /
    • 제23권3호
    • /
    • pp.45-64
    • /
    • 2022
  • 소셜미디어의 사용이 증가함에 따라 소셜미디어 상에서의 온라인 범죄도 증가하고 있다. 본 연구에서는 다양한 범죄 중 온라인 상에서의 성희롱에 집중하여 소셜미디어 사용자들이 온라인 성희롱을 피하기 위하여 어떤 방식으로 소셜미디어를 사용하는지를 논의하고자 한다. 이를 위하여 기술 위협 회피 이론을 기반으로 회피 동기에 영향을 주는 요인을 밝혔다. 이때, 소셜미디어 상의 기술적인 기능을 회피동기를 기반하여 기능별로 반영하여 측정하였으며 환경적인 요인이 행동의 동기에 어떤 영향을 주는지 검증하기 위하여 소셜미디어 상의 성애화 정도의 영향을 검증하였다. 그 결과 소셜미디어 상에서 성애화 정도가 클수록 회피동기가 적어짐을 알 수 있었다. 이를 통해 소셜미디어 상에 성적인 분위기가 성희롱을 회피하는 것을 줄이므로 지속적인 플랫폼 상의 게시물에 대한 관리를 통하여 성희롱에 대한 소셜미디어 사용자들이 적절한 대응을 할 수 있고 플랫폼도 범죄가 줄어드는 분위기를 형성하는 것이 중요하다.

아동 또래 놀이행동 척도(PIPPS)의 국내적용을 위한 타당한 연구 (Validation of the Penn Interactive Peer Play Scale for Korean Children)

  • 최혜영;신혜영
    • 아동학회지
    • /
    • 제29권3호
    • /
    • pp.303-318
    • /
    • 2008
  • Participants in this study of the validity and reliability of PIPPS (Penn Interactive Peer Play Scale; Fantuzzo et al., 1998) for Korean children were 248 5-to 6-year - old children and 11 teachers. Instruments included the Peer Rating Scale(PRS; Singleton et al., 1979), Social Competence and Behavior Evaluation (SCBE; LaFreniere & Dumas, 1995), and Preschool Behavior Questionnaire (PBQ; Behar & Stringfield, 1974). The structure of PIPPS resulted in 3 factors, 'play disruption', 'play interaction', and 'play disconnection' with 30 items similar to the original PIPPS factors. Validity was evidenced by inter-correlations among sub-factors and by correlations between PIPPS and criterion measures. PIPPS scores were validated by ratings from PRS, SCBE and PBQ sub-areas scores. Cronbach's a reliability of PIPPS factors ranged from .88 to .92.

  • PDF

Efficient Driver Attention Monitoring Using Pre-Trained Deep Convolution Neural Network Models

  • Kim, JongBae
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제14권2호
    • /
    • pp.119-128
    • /
    • 2022
  • Recently, due to the development of related technologies for autonomous vehicles, driving work is changing more safely. However, the development of support technologies for level 5 full autonomous driving is still insufficient. That is, even in the case of an autonomous vehicle, the driver needs to drive through forward attention while driving. In this paper, we propose a method to monitor driving tasks by recognizing driver behavior. The proposed method uses pre-trained deep convolutional neural network models to recognize whether the driver's face or body has unnecessary movement. The use of pre-trained Deep Convolitional Neural Network (DCNN) models enables high accuracy in relatively short time, and has the advantage of overcoming limitations in collecting a small number of driver behavior learning data. The proposed method can be applied to an intelligent vehicle safety driving support system, such as driver drowsy driving detection and abnormal driving detection.

보안측면에서의 산업제어시스템 비정상 행위 분류 (Classification of ICS abnormal behavior in terms of security)

  • 나중찬;조현숙
    • 정보보호학회논문지
    • /
    • 제23권2호
    • /
    • pp.329-337
    • /
    • 2013
  • 산업제어시스템의 사이버위협 특징은 의도하지 않았다고 하더라도 피해범위가 특정 시스템뿐만 아니라 네트워크의 서비스 제공을 위협하는 수준에 도달했다는 점이다. '보안'의 일부 범위는 단지 테러리스트나 사이버 해커의 고의적인 공격에 대한 시스템의 보호를 포함하지만, 종종 더 큰 피해는 의도적인 공격보다 부주의에 의한 설정 오류 또는 장비고장 등의 비고의적인 행위로 이루어 진다. 본 논문은 고의적 공격, 실수, 장비 고장 및 소프트웨어 문제를 포함한 ICS의 모든 비정상 행위에 대한 분류를 제안하였다. ICS의 비정상 행위 분류 기준은 고의적인 공격뿐만 아니라 부주의한 행동의 공통점과 중요한 특징을 강조하기 위해 선정되었다.

웹 기반 간호 교육을 위한 튜터의 운영 전략 개발 및 효과 검증 연구 (A Study of Development and Evaluation of Tutorial Management Strategy for Web-based Nursing Education)

  • 최지은;김분한
    • 성인간호학회지
    • /
    • 제17권4호
    • /
    • pp.635-645
    • /
    • 2005
  • Purpose: This study was attempted and completed in order to settle down and qualitatively improve web-based nursing education by evaluating effect and managing strategy of tutor. Method: The development of tutor's managing strategy was based on "The Self-regulated Learning" and "The supportive Learning", then it was applied to 79 learners in one of the cyber-learning centers. After applying the tutor's managing strategy, self-regulated learning scale, attitude for school, preference for computer and academic achievement were evaluated. The development of tutor's managing strategy for web-based nursing education are consisted of participation promotion, psychological support and motivation, recognition and promotion strategy of learning activity, management strategy of evaluating stage. Result: The levels of learner's self-regulated learning, recognition, behavior, attitude on the school and learning achievement were meaningfully increased in statistics after applying for the managing strategy of tutor. The motivation level and learning participation kept high scores from the beginning with no significant statistical changes. Conclusion: It is required to develop an educational program for cultivating well-educated tutors in order to help the effective learning process of nurses based on understanding characteristics of learners.

  • PDF

비트코인에 대한 안정성 확보를 위한 문제점 분석 (Problem Analysis to Secure Stability of Bitcoin)

  • 최희식;조양현
    • 디지털산업정보학회논문지
    • /
    • 제13권3호
    • /
    • pp.1-9
    • /
    • 2017
  • Recently, Bitcoin which is digital currency and cryptocurrency is getting worldwide attention since Bitcoin has an ability to replace legal tender unlike other existing cyber currency. Especially, most Bitcoin trading is done between two traders such as P2P method and it does not require a third-party to make sure reliability and it records every transaction details, so it is more transparent then traditional financial trade, so the number of users is increasing. However, Bitcoin, which has been recognized for transparency, confidentiality and stability among traders has recently been threatened by illegal transactions such as money laundering and the attack on the exchange. These threats to Bitcoin are becoming social problems. At first, it seems that most of the digital currency is difficult to get hacked due to the Blockchain technology. However, threats such as digital money leaks by user account hacking and paralyzing the servers are increasing. In this paper, it will examine the features of the Bitcoin and the threatening elements to secure marketability of digital currency such as Bitcoin and receive more interest from public in domestic. The paper will examine the problems of Blockchain technology on speculative transactions and fraudulent behavior by analyzing the problems of Bitcoin transaction. Lastly, it will propose ways to make transparent and secure digital currency transactions.