• 제목/요약/키워드: cyber space

Search Result 476, Processing Time 0.028 seconds

Tangible Space Initiative

  • Ahn, Chong-Keun;Kim, Lae-Hyun;Ha, Sung-Do
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2004.10a
    • /
    • pp.1053-1056
    • /
    • 2004
  • Research in Human Computer Interface (HCI) is towards development of an application environment able to deal with interactions of both human and computers that can be more intuitive and efficient. This can be achieved by bridging the gap between the synthetic virtual environment and the natural physical environment. Thus a project called Tangible Space Initiative (TSI) has been launched by KIST. TSI is subdivided into Tangible Interface (TI) which controls 3D cyber space with user's perspective, Responsive Cyber Space (RCS) which creates and controls the virtual environment and Tangible Agent (TA) which senses and acts upon the physical interface environment on behalf of any components of TSI or the user. This paper is a brief introduction to a new generation of Human Computer Interface that bring user to a new era of interaction with computers in the future.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Status and Measures for Cyber Sexual Violence (사이버 성폭력에 대한 실태와 대책방안)

  • Park, Cho-A
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.07a
    • /
    • pp.191-193
    • /
    • 2012
  • 인터넷과 기타 휴대용 PC등이 발전하고 보편화됨에 따라 인터넷 이용이 편리해짐은 좋지만 비대면성, 비익명성, 비 국경성 등 인터넷의 이러한 특성상 사이버 범죄들이 나날이 다양해지고 증가하고 있는 추세이다. 특히 사이버 범죄 중에서도 스토킹, 원조교제의 수단, 몰래카메라, 사이버음란물 유통 등 각종 신종 성폭력이 심각해지고 있어 사회문제로 끈임 없이 등장하고 있다. 현실세계에서의 성폭력과 마찬가지로 피해자가 느끼는 성적 수치심이나 심적 고통은 피해자의 자아에 깊은 상처를 남기며 더 나아가 왜곡된 성문화를 정착 시키는 새로운 사회적 문제로 작용한다는 점에서 사이버성폭력의 심각성과 문제는 오프라인상의 성폭력범죄에 비해 결코 뒤지지 않을 것이다. 물론 이러한 범죄들에 대한 처벌 조항들은 있다. 그러나 이런 것들이 있음에도 사이버상의 성폭력은 근절되지 않고 있다. 이것은 법적인 조치의 강화를 요구하는 동시에 인터넷을 사용하는 네티즌 스스로의 적극적 대처를 요구하는 것이기도 하다.

  • PDF

Conceptual Analysis of Cyber Electronic Warfare by OSI Reference Model (OSI 참조 모델에 의한 사이버전자전 개념 분석)

  • Lee, Minwoo;Lee, Jongkwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.600-601
    • /
    • 2021
  • The cyberspace, which is the fifth battle field, should be utilized for multi-domain maneuvering between the cyberspace and the physical space using an electromagnetic spectrum. This becomes a major concept of cyber electronic warfare that combines the characteristics of cyber warfare and electronic warfare. In this study, the concept of cyber electronic warfare is analyzed by using the OSI reference model and examining the threats of the two-layer data link layer.

  • PDF

Design and Implementation of web based cyber counseling system (웹기반 사이버 상담시스템의 설계 및 구현)

  • Lee Jae-Inn
    • The Journal of Information Systems
    • /
    • v.12 no.2
    • /
    • pp.21-39
    • /
    • 2003
  • Many people including teachers and students' parents must assist each student who will be a hero of future to develop their potential abilities and acquire various skills. Counseling is a fundamental thing to achieve this goal. But, in reality, it is usually difficult to do counseling which makes it possible to establish desirable self-view and world view expertly and systema tically because of burdensome task of teachers, spatial and time limit and students' extracurri cular activities. Taking advantages of computer networking, this research was designed to solve various problematic situations we can usually face with in school and home, to reduce limitations among three parties: teachers, parents and students, and to keep record continuously on the process and contents of counseling. And, also, this research is focused to web-based counseling network that makes possible to build database system easily adapts to specialty of each schools. Web based counseling system will provide these advantages: 1. Through analyzing and editing which will be done by expert In of accumulated database, to realize more systematic and expert database will be possible. 2. Owing to the physical characteristic of cyber space, counseling will be done any time and anywhere the computer is. 3. Because it is possible to minimize social limitations on physical condition, communication channel and anonymity of cyber space, counseling will be relatively easy to perform. 4. The contents of counseling will be automatically recorded on the database.

  • PDF

A Study on the Successful Operation for the Integration of Cyber Logistics (성공적(成功的)인 사이버 통합(統合) 물류(物流) 운영(運營)에 관(關)한 연구(硏究) -전자상거래(電子商去來)(홈쇼핑) 업체(業體)와 택배(宅配) 업체(業體)를 중심(中心)으로-)

  • Kim, Sang-In;Choi, Hong-Do;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.4
    • /
    • pp.247-258
    • /
    • 2015
  • The purpose of this study is to let the entire logistics system be managed in cyberspace by effectively sharing the logistics information between companies involved in the process, changing conventional commerce to electronic commerce. Most of the goods traded through electronic commerce are small goods involving small business transactions. This produces many problems in shipping and delivery and the leads an inefficient logistics system. Another problems is that there is no sharing of information that process the logistics flow and no systematic management of pick-up and delivery information. As a result, rise in logistics cost, longer delivery period and poor service quality are inevitable and these results are becoming an obstacle in the widespread usage of the electronic commerce. Companies that are part of logistics center can cooperate logistics business in Cyber space and share the entire logistics information through the cyber logistics center. This turns out in effective sharing of logistics information, and thus, allows efficient management of logistics, improves logistics service, and reduces logistics cost.

A Study on the Roles of Arbitration and Online Arbitration in International Cyber Trade (사이버무역에서 중재의 역할과 온라인중재에 관한 연구)

  • Oh Won-Suk;Yu Byoung-Yook
    • Journal of Arbitration Studies
    • /
    • v.14 no.1
    • /
    • pp.61-101
    • /
    • 2004
  • Information and communications technologies are affecting an economic and social transformation of all countries. Without exception international commercial dispute resolution systems are faced with change its mechanism to online technology. Dispute parties can seek redress through arbitration other than litigation or mediation. Traditional dispute resolutions do not match the cyber trade environment which is basically pursuit the speed and efficiency in cyberspace. Arbitration other than resolution methods have been considered to be match with the online environment which is including party autonomy, speed and internationally accepted and binding awards. Traditional arbitration, however is lack of time and different physical location relating all parties. So we now think cyberspace as for the resolving place which is online arbitration. Even the parties exist in different space and time they may meet in the same time and space without moving or trips. Nowadays there are many online arbitration service provider serving the resolution of dispute arising with online transaction. In this paper we study the tendency for online arbitration, the recognize uncertain matters and avoiding programs its matters when use the online arbitration between disputing parties under cyber trade environment.

  • PDF

Design and Implementation of Cyber Space using H.323 Terminal and Gatekeeper (H.323 단말기와 게이트키퍼를 이용한 사이버 공간의 설계 및 구현)

  • Kim, Ki-Yong;Lee, Keon-Bae
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1177-1188
    • /
    • 2003
  • In this paper, a cyber space for multimedia conference is designed and implemented using gatekeeper and web service which satisfies H.323 standards. The implemented gatekeeper manages a registration and a call control for H.323 video conference terminals. The implemented gate-keeper can manage registered users efficiently with directory services using web service. Also, software maintenance of video conference system is established by service provider instead of users using control download on web. finally, we present the practical use of video conference through various applications of directory services.

The Global Empathetic Society in Cyber Space (사이버공간과 글로벌 공감사회)

  • Suh, Moon-Gi
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.22 no.2
    • /
    • pp.111-122
    • /
    • 2019
  • This study attempts to analyze the critical issues of globalization and present an alternative framework that places ICT in the function of development in comparative perspective. To adjudicate the controversies concerning the effect of developmental factors, it examines the determinants of global trend that leads to the comprehensive mechanism of ICT and cultural residues. The advent of the global community in cyber space requires a new balancing point by the mode of communication and culture among all societies and operation with decentralized authority. This interdependence, by providing diverse network structures and participating in cyberspace, includes the power shift from the dynamics of international relations with voluntary collaboration and brings some important implications for a global empathetic society.

A Study on Digital Culture Phenomenon Shown in the Modernly Fashion Design (현대 패션디자인에 나타난 디지털문화현상)

  • Kim, Jee-Hee
    • Fashion & Textile Research Journal
    • /
    • v.7 no.2
    • /
    • pp.143-152
    • /
    • 2005
  • A concept of 'digital' is changing a living pattern of moderners, with having influence on the whole life of modern society. The purpose of this study is arrange the frame of conformity to the 'fashion as culture' by considering the social and cultural phenomena being shown in relation to digital, which is a concept being watched most for the 21st century and by trying to analyze a tendency of digital culture being shown in the modernly fashion design based on this. The digital culture, which is a concept of generalizing the phenomena of interactional changes in the sub-structure being derived by digital technology, is being shown as a tendency of fusionization and globalization, and due to this, the culture of digital nomads is being formed. On the other hand, a tendency of amenity caused by the reaction against the coldly digital technology, is forming one axis of digital culture. As the culture, which experiences the process of a change by digital technology, is reflected even on the fashion, the fusion of technology and the human body, brought about the appearance and the development of the artificial body, by allowing the wearable computer to be introduced to fashion and by being connected directly to the body. This means the expansion of range for fashion. The destruction of a border between space and space, is making an opportunity of forming another ego inside the cyber space, with bringing about the mixed loading between the cyber space and the real space. As the border between the cyber space and the real space is being collapsed, the space of newly self-realization is being created. The collapse of gender is being shown as the pursuit of gender, which is a nomadic concept of not giving priority to anywhere of male gender and female gender. The tendency of sensitive design introduced the sports look as the largely fashion trend. Fascinated with Zen thoughts is leading to a response to the swiftly and coldly social conditions caused by machine. The digital culture by digital technology and the fashion tendency being shown by its influence, meet the needs of self-realization and self-expansion for a human being, and satisfy the needs for the expression of self-identity for a human being, and enable the search for introspection about inner existence inside the self.