• Title/Summary/Keyword: cyber behavior

Search Result 249, Processing Time 0.024 seconds

Layered Authoring of Cyber Warfare Training Scenario (계층적 사이버전 훈련 시나리오 저작)

  • Song, Uihyeon;Kim, Donghwa;Ahn, Myung Kil
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.191-199
    • /
    • 2020
  • Cyber warfare training is a key factor for boosting cyber warfare competence. In general, cyber warfare training is conducted by scenarios, and the effects of training can be enhanced by including various elements in the scenarios that can improve the quality of training. In this paper, we introduce the training information, network map, traffic generation policy, threat/defense behavior identified as elements to be included in training scenarios, and propose a method of authoring training scenarios by layering and combining them. We also propose a database design for integrated management of each scenario layer. The layered training scenario authoring method has the advantage of increasing convenience of authoring by reusing existing layers and extending training scenarios based on various combinations between the layers.

Automatic malware variant generation framework using Disassembly and Code Modification

  • Lee, Jong-Lark;Won, Il-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.131-138
    • /
    • 2020
  • Malware is generally recognized as a computer program that penetrates another computer system and causes malicious behavior intended by the developer. In cyberspace, it is also used as a cyber weapon to attack adversary. The most important factor that a malware must have as a cyber weapon is that it must achieve its intended purpose before being detected by the other's detection system. It requires a lot of time and expertise to create a single malware to avoid the other's detection system. We propose the framework that automatically generates variant malware when a binary code type malware is input using the DCM technique. In this framework, the sample malware was automatically converted into variant malware, and it was confirmed that this variant malware was not detected in the signature-based malware detection system.

KOSDAQ Firm's Cyber IR Activity and Stock Price Behavior (코스닥 기업의 사이버 IR과 주가행태)

  • Song, Myung-Gyu;Cho, Jun-Hee;Kim, Chan-Jung
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.2
    • /
    • pp.388-397
    • /
    • 2012
  • Recently, KOSDAQ company's cyber IR activities has increased. Major advantages offered by the Internet include low cost and high accessibility the Internet is used as a strategic tool of many KOSDAQ companies in IR activity. Thus, this study tried to empirically analyze the overall impact of cyber IR. And this study examine the difference in impact of cyber IR activity on stock prices in the period before and after depending on ownership structure and venture or not. The main result of the study can be summarized as follows. First, IR activities have a positive impact on KOSDAQ firms stock price. This means that the investors are recognizing IR activity of KOSDAQ firm as a good news. Second, The lower stock ownership have great impact on stock prices. The act of reporting and monitoring system are performing effectively to lower stock ownership as compared with higher stock ownership. Third, The return rate of KOSDAQ venture firms with IR enforcement effect appears high than KOSDAQ firms with IR enforcement.

Meta-analysis for Exploring Predictors of Cyberbullying Perpetration among Youth in South Korea (청소년 사이버불링 가해행동 예측요인 탐색을 위한 국내연구 메타분석)

  • Kim, Shinah;Bang, Eunhye;Han, Yoonsun
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.5
    • /
    • pp.18-33
    • /
    • 2017
  • The purpose of this study was to examine the effect sizes of personal, family, peer, school, cyber environment, experience of bullying/victimization factors on cyberbullying perpetrating behavior among students in Korea using meta-analysis. Published academic journals and master/doctoral dissertations from 2010.01.01 to 2016.10.31 were identified using Research Information Sharing Service(RISS) data base. Keywords for search were cyberbullying, cyber-exclusion, cyber-violence, cyber-harassment, online/SNS peer harassment. A total of 43 studies were selected for meta-analysis. Personal factors and experience of bullying/victimization showed moderate effect sizes(0.28~0.29) and peer, family, cyber environment, school domains showed small effect sizes(0.08~0.13). Results of the study may be used to guide effective prevention or intervention strategies against cyberbullying among adolescents.

The Effects of Special Hospital Competencies on Customer Behavior Intentions (전문병원 역량이 고객 행동 의도에 미치는 영향 연구)

  • So, Kwon-Seob
    • The Korean Journal of Health Service Management
    • /
    • v.7 no.4
    • /
    • pp.153-165
    • /
    • 2013
  • This study aims to analyze how the competencies of specialized hospitals affect the customer behavior intentions. The research involved 14 specialized hospitals among 42 nationwide, which are selected by the Ministry of Health and Welfare in 2007. The results of the study are below. First, the competencies of specialized hospitals are emotional attachment and customer satisfaction proved to have the significant relationship. Second, the competencies of human resources and technology-related resources has a moderating effect with accessibility while the ability of material effect doesn't have such relation. Third, it was verified that the emotional attachment formed the customer satisfaction. Fourth, it turned out that the emotional attachment and customer satisfaction has the significant influence on customer behavior intentions. In conclusion, the competencies of specialized hospitals influences on the customer behavior intentions through the mediating effects of emotional attachment and customer satisfaction.

Factor Analysis of Negative SNS Behaviors using Association Rules (연관규칙을 이용한 SNS에서의 부정적 행동 요인 분석)

  • Lee, Soojung
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.2
    • /
    • pp.61-68
    • /
    • 2013
  • SNS is a social networking service that helps people to have a two-way communication, manage their personal relationships and share information. The domestic and international SNS markets have attained a steady growth, and their growth is being more accelerated recently. Under these circumstances, immature students are more likely to show negative cyber behavior. This study attempted to analyze the relationship between the use of SNS, motives of SNS use, the use of active SNS functions, SNS-dependency and views in SNS and negative SNS behaviors among elementary and middle school students. For this, negative cycber behaviors are classified into four stages depending on the severity, for each of which distribution of factors is investigated and the combination of factors to determine each stage is obtained through association rule analysis. As a result, it is found that 85% of the students rarely show negative cyber behaviors, stealing personal information and contacting with strangers are the most frequent negative behaviors, and students with a great dependency on SNS are highly probable to show negative behaviors.

  • PDF

The Importance and function of Cyber Psychology (사이버 심리의 중요성과 역할)

  • Choi Moon-Hee
    • Science of Emotion and Sensibility
    • /
    • v.8 no.1
    • /
    • pp.75-83
    • /
    • 2005
  • Cyberspace is on its way to experience dynamic change, hereby encompassing technical and social diversities and multiplicities. The internet, with a history of no more than 10 years, has drastically changed the way, meaning and conduct of our lives, the structure and function of society and communication. Even in psychology, in which the purpose is to scientifically look into the human mind and explore its behavior, the in-depth inquiry into the human behavior and psychological features of the cyberspace have become an increasingly important issue. Research suggests that psychological features and concepts brought about during the process of communication in cyberspace have been influenced by the digital mode following the analogue one, and by the online mode following the off line one. It also suggests that, with new issues peculiar to information society, cultural structures should be re-conceptualized, reconstructed and reevaluated in various fields. This approach to the changing role, meaning and style within society should be rearranged and referred to as cyber psychology.

  • PDF

The Effect of Family Meals on the Emotional and Behavioral Problems of Children (가족동반식사가 자녀의 심리에 미치는 영향)

  • Kim, Jong-Nam;Min, Hee-Jin;Chae, Jung-Min
    • Journal of the Korean Dietetic Association
    • /
    • v.19 no.2
    • /
    • pp.140-158
    • /
    • 2013
  • This study analyzed the effect of family meals on the psychological problems of children. We performed focus group interviews (FGI) on the basic characteristics of family meals, and chose several scales (such as Child Behavior Checklist (CBCL), self-esteem, and a daily hassles questionnaire), to measure the psychological variables. We collected data from 442 dyads (mother-child) and used 440 from dyads. In our results, the frequency of family meals affected the psychological problems of children, especially aggression and emotional instability. The atmosphere during meals also affected depression/anxiety, concentration difficulties, emotional instability, self-esteem, peer relationships, and sociality. There were significant correlations between meal atmosphere, family bonding, maternal personality, and psychological problems of children. We performed covariation analysis to examine and control the influence of family bonding and maternal personality; despite controlling for these variables, family meals still influenced children's psychological problems. We conclude that the family meal is a significant variable that impacts the emotional and behavioral problems of children and stress the importance of frequent family meals.

The Effects of User's Security Awareness on Password Security Behavior (정보보안의식이 패스워드 보안행동에 미치는 영향에 관한 연구)

  • Ha, Sang-Won;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.14 no.2
    • /
    • pp.179-189
    • /
    • 2013
  • With the rapid development of information technology in 21st century, networks are being used with various devices. Most human actions are processed through cyber space, and it is no longer separate from daily life; it has changed into one of the most important aspects of human life. Unfortunately, in cyber space, certification method has not only technical problems, but also ethological problems. Many users seemed to use the same password throughout several sites. And for a long period they refused to change it or made a small change from the earlier password. This research aims to discuss general factors of choosing and using passwords within information security through statistical analysis.

Emotional Behavior Decision Model Based on Linear Dynamic System for Intelligent Service Robots (지능형 서비스 로봇을 위한 선형 동적 시스템 기반의 감정 기반 행동 결정 모델)

  • Ahn, Ho-Seok;Choi, Jin-Young
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.8
    • /
    • pp.760-768
    • /
    • 2007
  • This paper introduces an emotional behavior decision model based on linear system for intelligent service robots. An emotional model should make different behavior decisions according to the purpose of the robots. We propose an emotional behavior decision model which can change the character of intelligent service robots and make different behavior decisions although the situation and environment remain the same. We defined each emotional element such as reactive dynamics, internal dynamics, emotional dynamics, and behavior dynamics by state dynamic equations. The proposed system model is a linear dynamic system. If you want to add one external stimulus or behavior, you need to add just one dimensional vector to the matrix of external stimulus or behavior dynamics. The case of removing is same. The change of reactive dynamics, internal dynamics, emotional dynamics, and behavior dynamics also follows the same procedure. We implemented a cyber robot and an emotional head robot using 3D character for verifying the performance of the proposed emotional behavior decision model.