• 제목/요약/키워드: cyber-university

검색결과 2,857건 처리시간 0.026초

침해 경험 및 정보보호 인식이 정보보호 행동에 미치는 영향에 대한 연구 : 이중 프로세스 이론을 중심으로 (A Study on the Influence of Victimization Experience and Awareness on Cyber Security Behavior - Focusing on Dual Process Theory)

  • 김창일;허덕원;이혜민;성욱준
    • 정보화정책
    • /
    • 제26권2호
    • /
    • pp.62-80
    • /
    • 2019
  • 본 연구의 목적은 정보침해 경험이 정보보호 활동에 직관적으로 미치는 영향과 정보보호 인식을 통해 분석적으로 미치는 영향을 이중 프로세스 이론(Dual Process Theory)을 통해 분석하는데 있다. 이를 위해 Baron & Kenny 매개 회귀분석을 사용하였으며 그 분석결과는 다음과 같다. 첫째, 정보침해 경험은 정보보호 활동에 긍정적인 영향을 미치는 것으로 분석되었다. 둘째, 정보보호 인식은 정보침해 경험과 정보보호 활동 간의 관계를 매개하는 것으로 분석되었다. 셋째, 정보침해 경험이 정보보호 활동에 직접적으로 주는 영향과 인식을 매개하여 주는 간접적 영향의 효과는 모두 정(+)의 효과를 주는 것으로 분석되었다. 또한 정보침해 경험이 정보보호 활동에 주는 직접적 영향은 인식을 매개하여 정보보호 활동에 주는 간접적 영향에 비해 상대적으로 큰 것으로 분석되었다. 해당 분석결과를 바탕으로 정보보안 활동이 제고 될 수 있도록 하는 주기적 정보보안 교육 및 캠페인 정책이 필요함을 제언하였다.

The Development of Cyber-Education in China: A Review of Experiences and Lessons

  • ZHU, Zhiting;WANG, Wei;LUO, Hongwei
    • Educational Technology International
    • /
    • 제6권2호
    • /
    • pp.1-9
    • /
    • 2005
  • Starting with analyzing the development of cyber-education in China, this article discusses experiences and lessons acquired through making reflections on the following aspects: technology vs. pedagogy, the degree education vs. non-degree education, resource exclusivism vs. resource inclusivism, mono-service system vs. multi-service system, and educational quality vs. economic profit. Finally, the paper puts forward some suggestions on the future development of cyber-education in China.

State-of-the-Art in Cyber Situational Awareness: A Comprehensive Review and Analysis

  • Kookjin Kim;Jaepil Youn;Hansung Kim;Dongil Shin;Dongkyoo Shin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권5호
    • /
    • pp.1273-1300
    • /
    • 2024
  • In the complex virtual environment of cyberspace, comprised of digital and communication networks, ensuring the security of information is being recognized as an ongoing challenge. The importance of 'Cyber Situation Awareness (CSA)' is being emphasized in response to this. CSA is understood as a vital capability to identify, understand, and respond to various cyber threats and is positioned at the heart of cyber security strategies from a defensive perspective. Critical industries such as finance, healthcare, manufacturing, telecommunications, transportation, and energy can be subjected to not just economic and societal losses from cyber threats but, in severe cases, national losses. Consequently, the importance of CSA is being accentuated and research activities are being vigorously undertaken. A systematic five-step approach to CSA is introduced against this backdrop, and a deep analysis of recent research trends, techniques, challenges, and future directions since 2019 is provided. The approach encompasses current situation and identification awareness, the impact of attacks and vulnerability assessment, the evolution of situations and tracking of actor behaviors, root cause and forensic analysis, and future scenarios and threat predictions. Through this survey, readers will be deepened in their understanding of the fundamental importance and practical applications of CSA, and their insights into research and applications in this field will be enhanced. This survey is expected to serve as a useful guide and reference for researchers and experts particularly interested in CSA research and applications.

가상강의에 대한 소비자만족모델: 기대불일치 패러다임을 중심으로 (Consumer Satisfaction Model for Cyber Learning: Focused on Expectation-disconfirmation Paradigm)

  • 유현정
    • 한국생활과학회지
    • /
    • 제19권2호
    • /
    • pp.295-310
    • /
    • 2010
  • This study measured college students' levels of satisfaction with their cyber learning through an online survey of students who had taken one or more cyber learning before. 500 returned and usable questionnaires were analyzed and SPSS WIN 12.0 was used for the descriptive statistics, t-test, factor analysis and analysis of covariance structures. The results are as follows; First, college students were very interested in their cyber learning. Their decision to take the cyber learning was initiated more by emotional motives (m=3.13) than by rational motives (m=3.35). Second, the consumers' expectations for the cyber learning were divided into the 'Expectation for service quality' and the 'Expectation for economy,' and their 'Expectation for economy'(m=4.02) was higher than their 'Expectations for service quality'(m=3.60). Third, the consumers' expectations for the cyber learning and the results of the cyber learning were analyzed, and a discrepancy between these two were also analyzed. The analysis of discrepancy between the two showed that the average of the results was lower than that of the expectations, which means that the cyber learning did not meet the consumers' expectations in every aspect, However, the average satisfaction level was 3.20, which means consumers were satisfied with the cyber learning overall. Fourth, causes of dissatisfaction with the cyber learning were divided into internal factors due to personal matters and external factors due to classes and other factors. It was found that dissatisfaction due to internal factors was greater than that due to external factors. Lastly, the factors affecting satisfaction/dissatisfaction with the cyber learning and willingness to use it again were analyzed. The results showed that the motive for its use affected the formation of expectation but it did not affect the results. Satisfaction with the cyber learning affected the willingness to use it again positively. However, the effect of dissatisfaction on the willingness to use it again was not statistically significant.

사이버 폭력의 피해자 지원에 대한 개선방안 (A Study on Improving Support for Victims of Cyber-Violence)

  • 박종렬
    • 한국컴퓨터정보학회논문지
    • /
    • 제17권1호
    • /
    • pp.227-233
    • /
    • 2012
  • 사이버 공간에서의 폭력이 최근 그 정도를 더해가고 있으며 이는 피해자에게 극심한 정신적 고통을 초래할 뿐만 아니라 건전한 사이버문화를 저해하고 있다. 이러한 사이버폭력의 특징 및 실태를 알아보고 그에 대한 대책을 제시해 보고자 했다. 사이버범죄는 비대면성, 익명성, 무제약성, 증거확보의 어려움 등을 특징으로 하며, 이러한 사이버범죄 중 사이버폭력은 사이버모욕, 사이버명예훼손, 사이버스토킹, 사이버음란물유포 등의 형태로 나타나는데 이에 대한 실질적인 대책이 미흡한 것이 현실이다. 이에 대한 대책으로 실정법상의 사이버모욕죄의 신설, 인터넷실명제의 도입, ISP의 책임의식 강화 및 형사처벌을 위한 관련입법이 필요하며, 보다 근본적인 대책으로 네티즌의 자정노력과 피해예방을 위한 체계적인 교육 및 홍보가 이루어져야 할 것이다.

긴장과 낮은 자기통제력이 사이버일탈에 미치는 영향: 인터넷 중독의 매개효과와 익명성의 조절효과 검증 (The Effect of Tension and Low Self-Control on Cyber Deviation: Analyzing The Mediating Effect of Internet Addiction and Moderating Effect of Anonymity)

  • 남수정
    • 대한가정학회지
    • /
    • 제49권2호
    • /
    • pp.63-74
    • /
    • 2011
  • Tension and self-control are explanatory factors in adolescent delinquency, and internet addiction and anonymity are regarded as factors underlying cyber deviation. The aim of this study was to investigate the interrelationships between these factors and cyber deviation. Participants were 485 middle and high school students in the Jeonbuk region. The results showed that tension and self-control were predictors of cyber deviation and that internet addiction was a mediating variable for both the predictors. Anonymity was found to have a mediating role, but only in respect of the tension-cyber deviation pathway. These findings suggested a number of implications. Firstly, the educational programs on cyber deviation should be different from the existing deviation prevention programs. Secondly, measures to prevent internet addiction are needed for the effective prevention of cyber deviation. Lastly, the finding of a relationship between anonymity and cyber deviation indicates the need to adopt a long-term perspective drawing on values education techniques to develop a code of cyber space ethics for "netizens".

사이버 물리 전력 시스템에 대한 허위 데이터 주입 공격에 관한 고찰 (An Overview of False Data Injection Attack Against Cyber Physical Power System)

  • 배준형
    • 전기전자학회논문지
    • /
    • 제26권3호
    • /
    • pp.389-395
    • /
    • 2022
  • 기술의 진화와 함께, 사이버 물리 시스템(Cyber Physical System)은 향상되고 있고 이에 따라 새로운 유형의 사이버 공격도 발견되고 있다. 사이버 공격에는 여러 가지 형태가 있으며 모든 사이버 공격은 대상 시스템을 조작하기 위해 이루어진다. 사이버 물리시스템 중 대표적인 시스템이 사이버 물리 전력 시스템, 즉 스마트 그리드이다. 스마트 그리드는 신뢰할 수 있고 안전하며 효율적인 에너지 전송 및 분배를 제공하는 새로운 유형의 전력망이다. 본 논문에서는 스마트 그리드의 상태 추정과 에너지 분배를 타깃으로 하는 허위 데이터 주입 공격(False Data Injection Attack)으로 잘 알려진 특정 유형의 사이버 공격 구성 방법과 이러한 공격의 방어를 위한 보호 전략과 탐지를 위한 동적 모니터링 기법을 소개한다.

청소년의 사이버 여가활동과 자율신경계 기능의 관계 (The Relationship between Cyber Leisure Activity and Autonomic Function in High School Students)

  • 손미은;김나현
    • Journal of Korean Biological Nursing Science
    • /
    • 제14권1호
    • /
    • pp.33-40
    • /
    • 2012
  • Purpose: The purpose of this study was to explore the relationship between cyber leisure activity and autonomic function in high school students. Methods: The subjects of this study were 242 second graders at high school located in D city. The research design was descriptive correlation study. Data were collected from August 26 to September 17, 2010, using a cyber leisure questionnaire and heart rate variability (SA-6000, Medicore, Korea) for autonomic function. Results: Total time for the cyber leisure activity was $391.3{\pm}262.0$ (min/week). Time for internet usage and computer game was $234.5{\pm}140.1$ (min/week) and $156.8{\pm}164.3$ (min/week), respectively. There were significant positive correlation between total cyber leisure time and sympathetic activity (r=.247, $p$ <.001). Conclusion: Excessive cyber leisure activity could increase sympathetic activities in high school students. Thus, nursing intervention to reduce the total cyber leisure time will be helpful to improve their neurophysiological status.

Cyber Insurance and Distribution Channels

  • Kwak, Young-Arm;Cho, Young-Sang
    • 유통과학연구
    • /
    • 제16권5호
    • /
    • pp.61-70
    • /
    • 2018
  • Purpose - These days, an individual user, private entity, hears everyday news of hacking and personal information leakage in the era of a most-connected society. This study investigates cyber attack, cyber insurance and distribution channels for insurance goods in South Korea by analyzing various cases of cyber attacks in domestic and overseas case. Research design, data and methodology - This study adopted various study cases instead of the one large case for deep quality analysis, and focused on various cases of domestic and overseas cyber attacks with insurance. Result - As a result of analyzing the cases that were hacked, types of massive losses and damages arising out of internet blackout due to cyber risks are paralyzation of public and private website and portal, electronic administrative system, public infrastructure, and consequently a normal operation of nation is impossible. These losses and damages however can be coverable under cyber insurance. Conclusions - This paper suggests insurance carriers, as suppliers, should provide multiple channels to sell to the customer and should expand the strategy of advertisement and promotion in order for them to change their mind and compare the price and value of the information of individual users and private entity in view of cost savings.

Cyber risk measurement via loss distribution approach and GARCH model

  • Sanghee Kim;Seongjoo Song
    • Communications for Statistical Applications and Methods
    • /
    • 제30권1호
    • /
    • pp.75-94
    • /
    • 2023
  • The growing trend of cyber risk has put forward the importance of cyber risk management. Cyber risk is defined as an accidental or intentional risk related to information and technology assets. Although cyber risk is a subset of operational risk, it is reported to be handled differently from operational risk due to its different features of the loss distribution. In this study, we aim to detect the characteristics of cyber loss and find a suitable model by measuring value at risk (VaR). We use the loss distribution approach (LDA) and the time series model to describe cyber losses of financial and non-financial business sectors, provided in SAS® OpRisk Global Data. Peaks over threshold (POT) method is also incorporated to improve the risk measurement. For the financial sector, the LDA and GARCH model with POT perform better than those without POT, respectively. The same result is obtained for the non-financial sector, although the differences are not significant. We also build a two-dimensional model reflecting the dependence structure between financial and non-financial sectors through a bivariate copula and check the model adequacy through VaR.