• 제목/요약/키워드: space and national security

검색결과 270건 처리시간 0.027초

Cybercrime in the Economic Space: Psychological Motivation and Semantic-Terminological Specifics

  • Matveev, Vitaliy;Eduardivna, Nykytchenko Olena;Stefanova, Nataliia;Khrypko, Svitlana;Ishchuk, Alla;Ishchuk, Olena;Bondar, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.135-142
    • /
    • 2021
  • The article reveals the essence of cybercrime, approaches to understanding this concept, classification of cybercrime, and other illegal acts in this area. The concept of cybercrime has multi-discourse nature and a certain legal uncertainty. Cybercrimes, their forms and types are analyzed in the economic context. The research vocabulary of the economic industry is defined. The scope and content of concepts denoted by the terms of the sphere covered by cybercrime are studied, and its types and forms are analyzed. The article studies problems, achievements, and prospects of resisting and combating cybercrime during the development of the civil information society and Ukraine's entry into the global information space. The study focuses on the economic motivation of most cybercrimes since some material benefit from the fact of cyber offenses is assumed directly or indirectly.

QNFT: A Post-Quantum Non-fungible Tokens for Secure Metaverse Environment

  • Abir El Azzaoui;JaeSoo Kim
    • Journal of Information Processing Systems
    • /
    • 제20권2호
    • /
    • pp.273-283
    • /
    • 2024
  • The digital domain has witnessed unprecedented growth, reshaping the way we interact, work, and even perceive reality. The internet has evolved into a vast ecosystem of interconnected virtual worlds, giving birth to the concept of the Metaverse. The Metaverse, often envisioned as a collective virtual shared space, is created by the convergence of virtually enhanced physical reality and interactive digital spaces. Within this Metaverse space, the concept of ownership, identity, and authenticity takes on new dimensions, necessitating innovative solutions to safeguard individual rights. The digital transformation through Metaverse has also brought forth challenges, especially in copyright protection. As the lines between the virtual and physical blur, the traditional notions of ownership and rights are being tested. The Metaverse, with its multitude of user-generated content, poses unique challenges. The primary objective of this research is multifaceted. Firstly, there's a pressing need to understand the strategies employed by non-fungible token (NFT) marketplaces within the Metaverse to strengthen security and prevent copyright violations. As these platforms become centers for digital transactions, ensuring the authenticity and security of each trade becomes paramount. Secondly, the study aims to delve deep into the foundational technologies underpinning NFTs, from the workings of blockchain to the mechanics of smart contracts, to understand how they collectively ensure copyright protection. Thus, in this paper, we propose a quantum based NFT solution that can secure Metaverse and copyright contents in an advanced manner.

The Main Methodological Positions of Educational Institutions in the System of Educational Work of the Modern Information Space

  • Shumiatska, Oleksandra;Palamar, Nataliia;Bilyk, Ruslana;Yakymenko, Svitlana;Yakovenko, Serhii;Tsybulko, Liudmyla;Bida, Olena
    • International Journal of Computer Science & Network Security
    • /
    • 제22권11호
    • /
    • pp.272-278
    • /
    • 2022
  • The article proves the idea that the protection and development of Ukraine as an independent, sovereign state requires the education of a patriot citizen who is able to live and work in a democracy, ensure the unity of Ukraine, feel constant responsibility for himself, his people, the country, and strive to make a real contribution to reform processes, especially in unstable, wartime. The main goal of educational institutions in the system of educational work of the modern information space is revealed. The tasks of patriotic education of the individual are presented. The content of patriotic education at the wartime stage and the main characteristics of the content of patriotism are substantiated. The main methodological positions that are taken into account in the construction of the structure and dynamics of the formation of civil responsibility of the individual are highlighted. The structure of civic responsibility as an integral system of the modern information space is drawn, which includes three subsystems that characterize the natural, social and systemic qualities of citizenship, interconnected hierarchically and synergistically. The components of the structural part of the model of civil culture of the individual in the modern information space are analyzed.Modern modernization of the education system in the modern information space, which has led to the emergence of a new type of Educational Institutions, requires the search for new pedagogical technologies that can ensure the formation of a patriotic citizen with an active civic position, which involves not only mastering students' knowledge about the rights and obligations of citizens, convincing them of the expediency of democratic transformations of society, the formation of high moral and strong-willed, patriotic qualities and feelings, but also identifying motivated civic actions, actions that are necessary during martial law in Ukraine.

Paradigm of the Transformation of Potential-Forming Space Under the Impact of Intellectual-Innovation Determinants

  • Khanin, Semen;Derhaliuk, Marta;Stavroyany, Serhii;Kudlasevych, Olga;Didkivska, Lesia
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.340-346
    • /
    • 2022
  • The article examines the formation of the scientific paradigm of transformation of the potential-forming space of the regional economy under the influence of intellectual and innovative determinants. Based on the study of different scientific views on the nature and properties of potential-forming space through the study of approaches to understanding the concept of "space" clarified the complexity and multifaceted nature of the phenomenon and found that its characteristics are relevant to the industrial development model. It is revealed that the leading modern trends related to the spread of globalization and regionalization, rapid development of information and communication technologies, diffusion of innovations accompany the transition from industrial to post-industrial development and its development, which leads to new development: changes production, nature and relations between business entities, etc. It is proved that under such conditions, the region as a key element of the economic system, acquires a leading role in achieving sustainable and balanced development. These processes significantly affect the potential-forming space of the regional economy under the influence of intellectual and innovative determinants, leading to the need for its transformation and change in accordance with modern realities, which is reflected in thorough research on the formation of scientific paradigm based on the formation of its theoretical foundations and methodological basis. This study reveals the essence, role, functions, structure, process of formation of the scientific paradigm of transformation of the potential-forming space of the regional economy under the influence of intellectual and innovative determinants. It is proved that the formation of the modern scientific paradigm of transformation of the potential-forming space of the regional economy under the influence of intellectual and innovative determinants occurs in the context of building a post-industrial model of development, accompanied by consideration of the region as a spatial object territories from the physical plane to the spatial environment in which the development of human capital, innovation and self-development of the region. Taking into account the above, the article outlines the prerequisites and factors of formation of the scientific paradigm of transformation of the potential-forming space of the regional economy under the influence of intellectual and innovative determinants.

Estimating the Validity of CPTED Guidelines on Residence Hall in University: Through the Comparison between CPTED Checklists and Space Syntax Analysis

  • Han, Dongho;Park, Changbae
    • Architectural research
    • /
    • 제17권4호
    • /
    • pp.117-126
    • /
    • 2015
  • University residence halls have become one of the most important issues for students when selecting their academic institutions. However, in South Korea, while universities maintain technologically up-to-date facilities, when it comes to safety or security, the management is unsatisfactory. As a result, the number of violent crime has been increasing. However, there are few researches in terms of practical validity of CPTED Guidelines even though a myriad of researchers study about CPTED Guidelines. Therefore, this study endeavours to investigate the validity of theoretical CPTED Guidelines that to what extent it might be adopted for design process. As a methodology, Space Syntax Convex map and Visibility Graph Analysis (VGA) are chosen. As a result, since the types of space which have a high level of Space Syntax Index are analogous with space treated on CPTED Guidelines, it roughly shows that the theoretical CPTED Guidelines could be adopted in practical architectural design process. Furthermore, it reveals that there is a close relationship between detail design guide stated in CPTED Guidelines and the result of VGA. That is, through the analysis, it is proved that the validity of CPTED Guidelines is quite enough to be adopted in practical design process.

Target Object Image Extraction from 3D Space using Stereo Cameras

  • Yoo, Chae-Gon;Jung, Chang-Sung;Hwang, Chi-Jung
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 ITC-CSCC -3
    • /
    • pp.1678-1680
    • /
    • 2002
  • Stereo matching technique is used in many practical fields like satellite image analysis and computer vision. In this paper, we suggest a method to extract a target object image from a complicated background. For example, human face image can be extracted from random background. This method can be applied to computer vision such as security system, dressing simulation by use of extracted human face, 3D modeling, and security system. Many researches about stereo matching have been performed. Conventional approaches can be categorized into area-based and feature-based method. In this paper, we start from area-based method and apply area tracking using scanning window. Coarse depth information is used for area merging process using area searching data. Finally, we produce a target object image.

  • PDF

Using The Internet As A Tool For The Illicit Sale Of Drugs And Potent Substances

  • Manzhai, Oleksandr;Cherevko, Kyrylo;Chycha, Ruslan;Burlaka, Iryna;Piadyshev, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.246-250
    • /
    • 2022
  • The article analyzes the regulations of current criminal law and current issues, combating drug crime on the Internet, as well as measures to combat drug crime in the field of modern information technology. In connection with the growth of crimes in the field of drug trafficking committed with the use of information and telecommunications technologies, the urgent task of the state is to find effective ways to reduce drug crime. The article considers criminologically significant aspects of the mechanism of illicit drug trafficking, which is carried out with the use of information and telecommunication technologies and means of remote communication.

2011년 세계 각국의 우주분야 투자 및 우주산업 현황 (Statuses of World Governments' Space Activities and Space Markets in 2011)

  • 최남미
    • 항공우주산업기술동향
    • /
    • 제9권1호
    • /
    • pp.3-14
    • /
    • 2011
  • 인류의 최초 우주 비행으로부터 50년, 최초의 인공위성 발사로부터 54년이 지난 현재 인류의 우주 활동은 어느 때 보다 활발하다. 2000년대 들어 연평균 66회 발사된 우주발사체는 2010년 74회 발사되었으며, 2010년 지구 궤도에서 운행되고 있는 인공위성은 900개에 이르렀다. 우주자산은 국가의 국방 및 안보에 기여할 뿐만 아니라 사회의 경제, 기술 개발에 없어서는 안 되는 필수요소로 자리잡음에 따라 국가가 투자할 가치가 있는 중요 부분이 되었다. 2010년 세계 각국의 우주개발 예산은 715억 달러로 역사상 최대치에 도달하였다. 2002년 이후 세계 우주개발 예산은 연간 8%의 증가율을 보였으나, 2010년 2%로 낮아져 투자 증가율은 다소 둔화되었다. 반면 우리나라의 2011년 정부의 우주개발 예산은 1,825억원으로 2008년 이후 연평균 16%로 감소하였다. 천리안 위성 및 나로호 개발이 완료됨에 따라 개발주기에 따른 예산감소의 영향으로 분석된다. 본 논문에서는 세계 각국 및 우리나라의 우주분야 투자와 우주시장 현황을 정리하였고, 우리나라 예산정책에 관한 시사점을 제고해보았다.

  • PDF

상관관계를 갖는 MIMO 채널에서 하나의 피드백 비트를 이용한 OSTBC의 물리계층 보안 성능 평가 (Secrecy Performance Evaluation of OSTBC using One-Bit Feedback in Correlated MIMO Channels)

  • 이상준;이인호
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 추계학술대회
    • /
    • pp.886-889
    • /
    • 2014
  • 본 논문에서는 통신 신호를 도청하는 도청자가 존재하는 환경인 와이어탭(wiretap) 채널을 가정하여 하나의 피드백 비트를 이용한 직교 시공간 블록 코드(orthogonal space-time block code, OSTBC)의 물리계층 보안 성능을 평가한다. 여기서, 공간적 상관관계를 갖는 MIMO(multiple-input multiple-output) 채널을 가정한다. 본 논문에서는 하나의 피드백 비트를 이용한 OSTBC(one-bit feedback based OSTBC, F-OSTBC) 기술을 제시하고, 각 노드에서의 공간 채널 상관계수를 다양하게 가정하여 F-OSTBC와 기존의 OSTBC, 그리고 송신 안테나 선택 기술에 대한 보안 아웃티지 성능을 비교한다.

  • PDF

Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System

  • Wu, Tzong-Sun;Chen, Yih-Sen;Lin, Han-Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권3호
    • /
    • pp.1157-1177
    • /
    • 2014
  • Convertible authenticated encryption (CAE) schemes enable the signer to send a confidential message and its corresponding signature to the designated recipient. The recipient can also convert the signature into a conventional one which can be verified by anyone. Integrating the properties of self-certified public key systems, this paper presents efficient and computationally indistinguishable self-certified CAE schemes for strengthening the security of E-Commerce applications. Additionally, we also adapt the proposed schemes to elliptic curve systems for facilitating the applications of limited computing power and insufficient storage space. The proposed schemes are secure against known existential active attacks, satisfy the semantic security requirement, and have the following advantages: (i) No extra certificate is required since the tasks of authenticating the public key and verifying the signature can be simultaneously carried out within one step, which helps reducing computation efforts and communication overheads. (ii) In case of a later dispute, the recipient can convert the signature into an ordinary one for the public arbitration. (iii) The signature conversion can be solely performed by the recipient without additional computation efforts or communication overheads. (iv) The recipient of the signature can prove himself, if needed, to anyone that he is actually the designated recipient.