• Title/Summary/Keyword: cyber space

Search Result 476, Processing Time 0.021 seconds

Making a Civil War Surrounding History in Cyber Space Focused on 5·18 Discourses in Ilbe Storehouse (사이버 공간에서의 역사의 내전(內戰)화 '일간베스트저장소'의 5·18 언설을 중심으로)

  • Jung, Soo-Young;Lee, Youngjoo
    • Korean journal of communication and information
    • /
    • v.71
    • /
    • pp.116-154
    • /
    • 2015
  • Officially given a historical signifier as Gwangju Democratic Movement since 1987, far-right and conservative group have restated that $5{\cdot}18$ is a rebellion and a riot that was committed by rebellious elements who obeyed North Korea's command or who were connected with North Korea. As those who had been responsible for the rebellion, revolt and riot were rewarded, far-right and conservatives' collective narrative that a country was born where the pro-North Korea left became dominated aroused extreme hostility towards $5{\cdot}18$. Far-right and conservatives involved in many different fields such as political party, university, press and media and civil group carry out incendiary discourse politics with intention to reestablish history and memory of $5{\cdot}18$ in their own story. Many people at online sites such as Ilbe Storehouse who are considered 'young right wing' is a main route to spread the far-right groups' remarks on $5{\cdot}18$. Ilbe is a main channel to reconstitute and reproduce the far-right conservatives' remarks and information on $5{\cdot}18$. Ilbe is one of main area where remarks of disparagement and ridicule, hostility and hatred on $5{\cdot}18$ unfurl. This study collects $5{\cdot}18$-related remarks and stories unfolded at Ilbe and examines how these remarks and stories make significance as to $5{\cdot}18$ and how information resources which remarks are dependent upon are connected each other. In this process, this study intends to find implications of incendiary politics that echoed of remarks on $5{\cdot}18$ have which at the online site Ilbe and by the far-right conservatives.

  • PDF

A Study on Collection and Analysis Method of Malicious URLs Based on Darknet Traffic for Advanced Security Monitoring and Response (효율적인 보안관제 수행을 위한 다크넷 트래픽 기반 악성 URL 수집 및 분석방법 연구)

  • Kim, Kyu-Il;Choi, Sang-So;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1185-1195
    • /
    • 2014
  • Domestic and international CERTs are carrying out security monitoring and response services based on security devices for intrusion incident prevention and damage minimization of the organizations. However, the security monitoring and response service has a fatal limitation in that it is unable to detect unknown attacks that are not matched to the predefined signatures. In recent, many approaches have adopted the darknet technique in order to overcome the limitation. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. Thus, all the incoming traffic to the darknet can be regarded as attack activities. In this paper, we present a collection and analysis method of malicious URLs based on darkent traffic for advanced security monitoring and response service. The proposed method prepared 8,192 darknet space and extracted all of URLs from the darknet traffic, and carried out in-depth analysis for the extracted URLs. The analysis results can contribute to the emergence response of large-scale cyber threats and it is able to improve the performance of the security monitoring and response if we apply the malicious URLs into the security devices, DNS sinkhole service, etc.

The Aspectual Theory of the Cybercharacter (사이버캐릭터의 위상론)

  • 이선교
    • Archives of design research
    • /
    • v.12 no.4
    • /
    • pp.182-190
    • /
    • 1999
  • There has been the rapid change of paradigm with the overflow of terms related to computers such as information, digital, cyber, virtual world and the change of time concept on the ground that it is common to change the world into virtual time. This study is about cybercharacters working in air-broadcasting with rapidly-developing internet, The cybercharacters including 3D animation developed from 2D animation are know to be manufactured with use of electronic mediun and computers and to exist in electronics. Though the emergence of the cybercharacters has a lot of gflnetic roots according to their objectives, they have in common that they are made by 3D graphics and they work in the virtual space, The great traits of the cybercharaters lie in the extension of interfacial function and ecological growth. In the cyberspace the interface, the meeting point between a computer and its users is the most important, The cybercharacters as medium providing new ruman interface become effective with growing interest in virtual reality, The cybercharacters also keep the ecological traits, They can also bring about added value with infusion of image and development of the network, These cybercharacters can also play the important parts in the continually developing cyberspace, The successful birth of the cybercharacter are based on, the technological power. assistance of fund and the ctrltural background, The information-entertainment of the cybercharacters functions well with the accompinimene of these three things, The cybercharacters can make a subject which keeps single issue as a central point of the virtual realty, The cybercharacters can also be connected with equity of "Korean knowledge information society" in the cultural rule of the internet and sociocul tural identity, identity.

  • PDF

Why Won't the Field Wall Collapse in the Typhoon? : Mathematical Approach to Non-orthogonal Symmetric Weighted Hadamard Matrix I (밭담은 태풍에 왜 안 무너지나?: 비직교 대칭 하중 아다마르 행렬에 의한 수학적 접근 I)

  • Lee, Moon-Ho;Kim, Jeong-Su
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.211-217
    • /
    • 2019
  • The three major inventions of Jeju include the field wall of Kim Koo Pan Gwan in 1234, Jeongnang in the custom of grazing the people of Jeju, and Olleh in the tomb of Munbang-gui in 1406. Field wall, Oedam from the stone and the stone of numerical play, made Koendang, a friendship society. Even with a typhoon that is more than 30m/s, the Koendang which is about 1.5m high, will not collapse. Similarly, the main family networks of Jeju society do not collapse under any difficulties situation. When building a field wall, two stones, which are under the ground, are placed side by side, and the upper left stone is placed on top and the upper right stone is attached regularly. One stone or two stone is attached from the bottom to the top, and when a stone is small or large, a flat field is formed in one space. The Family networks is close to the grandfather, grandmother, father, mother, and me, and the distant kin represents a horizontal relationship. The field wall is a vertical relationship that builds up from bottom to top of the vertical relation, while the Koendang is a horizontal relationship where blood is distributed to the grandson of his upper grandparents. This paper proves by a non-orthogonal symmetric weighted Hadamard matrix of whether the stone in the middle of a field wall has large stones (small).

A Qualitative Study on Coping strategies of Older adults with Depression: Focused on the Experience of Coping with Depression in Older Adults Living in Seoul (노인의 우울 대처 전략에 관한 질적 연구: 서울시 거주 도시 노인의 우울 대처 경험을 중심으로)

  • Eo, Yugyeong;Ko, Jung Eun;Kim, Soon Eun
    • 한국노년학
    • /
    • v.37 no.3
    • /
    • pp.583-600
    • /
    • 2017
  • The purpose of this study is to explore qualitatively what kind of coping strategy the Korean older adults use when they are depressed and why. Participants were users, older than 60, of an elderly welfare center in Seoul, and answers of 34 respondents who experienced depression were included in the analysis. The collected data were analyzed through content analysis. The results of the analysis showed that strategies to cope with depression used by participants were composed of 6 domains and 11 sub-domains: health behavior (medical approach / exercise and diet), family and social contact (social interaction / going out and going on a trip / communication with family), Religious activities (Religious activities), lifelong education (hobbies / educational activities), productive activities (labor), health risk behaviors (drinking and gambling / resignation). The depression coping strategies of the older adults and their characteristics are as follows. First, older adults used diverse problem-focused coping strategies to cope with depression. Second, older adults considered various coping strategies together and used them simultaneously. Third, the facility space for older adults functions as a shelter. Fourth, although there were cases where medical approach was used, the intention to reuse was very low. Through this study, the following suggestions were made to help older adults cope with depression more successfully. First, access to various coping strategies should be promoted. Second, more places where older adults can spend their time comfortably need to be provided. Third, resistance to mental health care should be resolved.

Current Trends in the U.S. Cybersecurity Laws (미국 사이버보안법의 최근 동향 - 「사이버보안 정보공유법」을 중심으로 하여 -)

  • Yang, Chun-Soo;Jee, Yu-Mi
    • Journal of Legislation Research
    • /
    • no.54
    • /
    • pp.155-192
    • /
    • 2018
  • As the 'hyper-connected society' has emerged through the 'Fourth Industrial Revolution, public interests as well as social dangers have increased. Above all, the risk of infringement of information, including confidential personal information, is dramatically increasing. As the hyper-connected society has been realized, even if only one of the internet devices is hacked, there would be a danger that the ripple effect of such a hacking spreads to the whole network. Therefore, the necessity and importance of information security, including cybersecurity, has been increasing. In other words, the stability of cyberspace and internet space is becoming more important. As a result, the Korean government is seeking to build a legal system related to information security, which would be able to cope with the information infringement problem in the hyper-connected society. However, it seems that the government is still struggling with the direction of building such a legal system. In this context, a comparative review examining the legal systems of advanced foreign countries will provide meaningful implications as to what kinds of legal policies we should devise and implement for information security. In particular, the U.S. legislative act that actively responds to the cybersecurity violations is worthy of reference. For this reason, this article systematically analyzes the current status of the U.S. cybersecurity laws. Especially, this article focuses on the "Cybersecurity Information Sharing Act of 2015"(hereinafter "CISA"), that was recently enacted by the U.S. congress. The CISA prescribes the systemic and detailed information-sharing between national and private entities. The CISA, that actively promotes information-sharing, is full of suggestions for us, in that information-sharing is an effective way to properly realize information security in today's hyper-connected society.

Directing User's Eye Gaze Movement in an Interactive VR Animation (인터랙티브 VR 애니메이션의 시선 유도를 위한 연출)

  • Ahn, Chan-Je;Lee, Tae-gu
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.3
    • /
    • pp.103-113
    • /
    • 2021
  • Rather than a directing method of existing animations, VR animation needs a different method of direction. Existing animations were displayed on a screen in movie theaters. But using an existing direction method for the 360° perspective in a VR animation makes it difficult for the user's gaze to move in a way the directors have intended. I analyzed 3 VR animations with a theoretical background of Rudolf Arnheim's visual perception theory and Bruce Block's visual factors that bring high attention. In the process of perception of space, focus on the gaze, movement of the gaze, the 'movement' factor was used most often to attract the gaze. An interactive VR animation attracts user's gaze by allowing users to participate in important points of the story. With an analysis of the animation, it proposed a gaze attraction through the movement of the character with an interaction directing method for reducing motion sickness. Also, it proposed intuitively attracting gaze movement by using GUI and attracting user's participation by using an interactive event with an interaction directing method of storytelling comprehension. With two types of directing proposal, we expect it to be utilized as a basic research method for attracting users to be immersed in storytelling while reducing cyber motion sickness, which is a problem in VR animation.

Development of Pollutant Transport Model Working In GIS-based River Network Incorporating Acoustic Doppler Current Profiler Data (ADCP자료를 활용한 GIS기반의 하천 네트워크에서 오염물질의 이송거동모델 개발)

  • Kim, Dongsu
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.6B
    • /
    • pp.551-560
    • /
    • 2009
  • This paper describes a newly developed pollutant transport model named ARPTM which was designed to simulate the transport and characteristics of pollutant materials after an accidental spill in upstream of river system up to a given position in the downstream. In particular, the ARPTM incorporated ADCP data to compute longitudinal dispersion coefficient and advection velocity which are necessary to apply one-dimensional advection-dispersion equation. ARPTM was built on top of the geographic information system platforms to take advantage of the technology's capabilities to track geo-referenced processes and visualize the simulated results in conjunction with associated geographic layers such as digital maps. The ARPTM computes travel distance, time, and concentration of the pollutant cloud in the given flow path from the river network, after quickly finding path between the spill of the pollutant material and any concerned points in the downstream. ARPTM is closely connected with a recently developed GIS-based Arc River database that stores inputs and outputs of ARPTM. ARPTM thereby assembles measurements, modeling, and cyberinfrastructure components to create a useful cyber-tool for determining and visualizing the dynamics of the clouds of pollutants while dispersing in space and time. ARPTM is expected to be potentially used for building warning system for the transport of pollutant materials in a large basin.

Research on functional area-specific technologies application of future C4I system for efficient battlefield visualization (미래 지휘통제체계의 효율적 전장 가시화를 위한 기능 영역별 첨단기술 적용방안)

  • Sangjun Park;Jungho Kang;Yongjoon Lee;Jeewon Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.109-119
    • /
    • 2023
  • C4I system is an integrated battlefield information system that automates the five elements of command, control, communications, computers, and information to efficiently manage the battlefield. C4I systems play an important role in collecting and analyzing enemy positions, situations, and operational results to ensure that all services have the same picture in real time and optimize command decisions and mission orders. However, the current C4I has limitations whenever a new weapon system is introduced, as it only provides battlefield visualization in a single area focusing on the battlefield situation for each military service. In a future battlefield that expands not only to land, sea, and air domains but also to cyber and space domains, improved command and control decisions will be possible if organic data from various weapon systems is gathered to quickly visualize the battlefield situation desired by the user. In this study, the visualization technology applicable to the future C4I system is divided into map area, situation map area, and display area. The technological implementation of this future C4I system is based on various data and communication means such as 5G networks, and is expected to enable hyper-connected battlefield visualization that utilizes a variety of high-quality information to enable realistic and efficient battlefield situation awareness.

Analysis of Internet Biology Study Sites and Guidelines for Constructing Educational Homepages (인터넷상의 고등학교 생물 학습사이트 비교분석 및 웹사이트 구축방안에 관한 연구)

  • Kim, Joo-Hyun;Sung, Jung-Hee
    • Journal of The Korean Association For Science Education
    • /
    • v.22 no.4
    • /
    • pp.779-795
    • /
    • 2002
  • Internet, a world wide network of computers, is considered as a sea of information because it allows people to share information beyond the barriors of time and space. However, in spite of the unmeasurable potential applications of the internet, its use in the field of biology education has been extremely limited mainly due to the scarcity of good biology-related sites. In order to provide useful guidelines for constructing user-friendly study sites, which can help high school students with different intellectual levels to study biology, comparative studies were performed on selected educational sites. Initially, hundreds of related sites were examined, and, subsequently, four distinct sites were selected not only because they are well organized, but also because each is unique in its contents. Also, a survey was carried out against the users of each site. The survey results indicated that the high school students regard the web-based biology study tools as effective teaching methods although there might be some bias in criteria for selecting target sites. In addition to the detailed biology topics and the related biology informations, multimedia data including pictures, animations and movies are found to be one of the important ingredients for desirable biology study sites. Thus, the inclusion of multimedia components should also be considered when developing a systematic biology study site. Overall, the role of the cyber space is expected to become more and more important. Since the development of the user-satisfied and self-guided sites require interdisciplinary collaborational efforts which should be made to promote extensive communication among teachers, education professionals, and computer engineers. Furthermore, the introduction of good biology study sites to the students by their teachers is also important factor for the successful web-based education.