DOI QR코드

DOI QR Code

Comparative Analysis of Information Security Textbooks for Chinese Elementary and Secondary Students

중국의 초·중등학생 대상 정보보호 교재 비교 고찰

  • Eunsun Choi ;
  • Namje Park (Department of Computer Education, Teachers College, Jeju National University)
  • 최은선 (제주대학교 사이버보안인재교육원) ;
  • 박남제 (제주대학교 교육대학 초등컴퓨터교육전공)
  • Received : 2023.03.21
  • Accepted : 2023.05.01
  • Published : 2023.05.31

Abstract

Digital transformation is taking place rapidly around the world. As the development of digital technology becomes very fast, more information is expected to be digitized. Therefore, the possibility of cyber threats is increasing in transmitting and storing sensitive information such as personal and financial information online. In this paper, we compared and analyzed information security textbooks for elementary and secondary school students in China, where the recent development of artificial intelligence and digital transformation are rapidly occurring. After we collected related textbooks, textbooks suitable for analysis were selected. Then, we analyzed the external and internal systems of the textbooks separately. As a result of the external system analysis, all the textbook covers were properly produced, but the quality difference was significant among textbooks. In the case of textbooks for elementary school students, the excellence of layout and content placement was noticed. On the other hand, due to the internal system analysis, various contents were not included evenly when looking at the learning contents based on the "information society responsibility" learning goals presented in China. Through this paper, we hope to provide implications for information security-related education and textbook development research.

전 세계적으로 곳곳에서 급격하게 디지털 전환이 이루어지고 있다. 디지털 기술의 발전 속도가 매우 빨라지면서 앞으로 더 많은 정보들이 디지털화될 것으로 예상된다. 따라서 개인정보, 금융정보 등의 민감 정보가 온라인에서 전송되고 저장되는 과정에서 사이버 위협이 발생할 수 있는 가능성이 높아지고 있다. 본 논문에서는 최근 인공지능의 발전과 디지털 전환이 급속도로 이루어지고 있는 중국의 초·중등학생 대상 정보보호 교재를 비교하여 분석하였다. 관련 교재를 수집 후 분석에 적절한 교재를 선별하였으며, 교재의 외적 체제와 내적 체제를 구분하여 분석하였다. 외적 체제 분석 결과, 교재 표지는 모두 적절하게 제작되었으나, 교재 내지는 교재마다 질의 차이가 크게 나타났다. 초등학생 대상 교재의 경우 레이아웃, 내용 배치의 우수성이 두드려졌다. 내적 체제 분석 결과, 중국에서 제시한 '정보사회 책임' 학습 목표를 기준으로 학습 내용을 살펴보면, 다양한 내용이 고루 포함되어 있지 않은 경우가 있었다. 본 논문을 통해 정보보호 관련 교육 및 교재 개발 연구에 시사점을 제공하기 바란다.

Keywords

Acknowledgement

This work was supported by the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea (NRF-2022S1A5C2A04092269), and, this work was supported by the Korea Foundation for the Advancement of Science and Creativity(KOFAC) grant funded by the Korea government(MOE).

References

  1. Korea Intellectual Property Office, The Internet of Things (IoT) era, there is no thing without security! https://eiec.kdi.re.kr/policy/materialView.do?num=140627
  2. E. Choi and N. Park. Information Security Humanities in Jeju Story, Jeju National University Press, 2022.
  3. R. Di Pietro and S. Cresci, "Metaverse: Security and Privacy Issues", 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA, 2021, pp.281-288, http://dx.doi.org/10.1109/TPSISA52974.2021.00032.
  4. Personal Information Protection Commission, Infringement status of personal information. https://www.privacy.go.kr/front/contents/cntntsView.do?contsNo=39
  5. E. Yu. Size of Personal Information Leakage by Private Enterprises/Institution, Yu Euidong Councilor's office, 2023.
  6. E. K. Seo. "A Study on the Legislation of Personal Information Protection in China - Focusing on the Cyber security law. Journal of Sinology and China Studies", Vol. 72, No. 0, pp.131-155, 2017. http://dx.doi.org/10.18077/chss.2017.72..007
  7. Korea Internet & Security Agency. Status of China's personal information protection law administrative system and major violations, Korea Internet & Security Agency, 2021.
  8. S. -S. Park and S. -K. Han. "KASP-Integrated Learning Model for the Information Security Education in Elementary Education", Journal of The Korean Association of information Education (JKAIE), Vol. 14, No. 2, pp.157-164, 2010.
  9. Korean Statistical Information Service, Internet(OECD Member Country)https://kosis.kr/statHtml.do?orgId=101&tblId=DT_2KAAA13_OECD
  10. M. -S. Rhee. "Strengthening of Information Protection Education in Regular Schools", KIISC Review, Vol. 13, No. 6, pp.67-78, 2003.
  11. S. W. Tabor. "Narrowing the Distance: Implementing a Hybrid Learning Model for Information Security", Quartely Review of Distance Education, Vol. 8, Issue 1, pp.47-57,89, 2007.
  12. M. -S. Kang, T. -S. Kim, T. -Y. Kim. "Effects of Information Security Education on the Practice of Information Security for the Youth", Journal of Information Technology Applications and Management, Vol. 26, Issue 2, pp.27-40, 2019. https://doi.org/10.21219/jitam.2019.26.2.027
  13. B. -R. Kim, J. -W. Lee, B. -S. Kim. "Effect of Information Security Training and Services on Employees' Compliance to Security Policies", Informatization Policy, Vol. 25, No. 1, pp.99-114, 2018. https://doi.org/10.22693/NIAIP.2018.25.1.099
  14. D. Lee, N. Park. "Teaching Book and Tools of Elementary Network Security Learning using Gamification Mechanism", Journal of The Korea Institute of Information Security & Cryptology. Vol. 26, No. 3, pp.787-797, 2016. http://dx.doi.org/10.13089/JKIISC.2016.26.3.787
  15. N. Park. "Development and Application of Elementary Information Security Education STEAM Program through Simulation Hacking Play Activities", Journal of The Korean Association of Information Education, Vol. 20, No. 3, pp.273-282, 2016. https://doi.org/10.14352/jkaie.2016.20.3.273
  16. Y. Jung, E. Choi, N. Park. "Educational Aids for Teaching Hacking Principles to Strengthen Computational Thinking Skills to Elementary", Webology, Vol. 19, No. 1, pp.4527-4536, 2022. https://doi.org/10.14704/WEB/V19I1/WEB19299
  17. N. Park, N. Kang. "Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle", Sensors, Vol. 16, No. 1, p.20, 2016. https://doi.org/10.3390/s16010020
  18. D. Cary. China's Cyber, AI Talent Pipeline, CSET Policy Brief, Center for Security and Emerging Techonology, 2021.
  19. Ministry of Education of the People's Republic of China. Information Technology Curriculum Standards for Compulsory Education (2022 Edition), Beijing Normal University Publishing Group, 2022.
  20. J. Kim. "International Comparative Study of Curriculum in Information Education in Elementary Schools", The Journal of Korean Practical Arts Education, Vol. 29, No. 1, pp.55-77, 2023. https://doi.org/10.29113/skpaer.2023.29.1.04
  21. C. A. Tucker, Evaluating Beginning Textbooks. English Teaching Forum, No. 13, pp.355-361, 1975.
  22. A. Skierso, Textbook Selection and Evaluation, In M. Celce-Murcia (Ed.), Teaching English as a second or foreign language, Heinle and Heinle Publishers, 1991.
  23. Y. M. Kim. Comparative Study on the Computer Textbooks between India and Korean High school - for the Academic high school, Master Thesis. Konkuk University, Seoul, Korea, 2011.
  24. S. H. Moon. "A Study on ICT Conversion and Change of Industrial Society", The Journal of Convergence of Culture Technolgoy (JCCT), Vol. 7, No. 4, pp.653-658, 2021. http://dx.doi.org/10.17703/JCCT.2021.7.4.653
  25. J. W. Lee and N. Park, Encryption Scheme Supporting Range Queries on Encrypted Privacy Databases in Big Data Service Era, In: Yeo, SS., Pan, Y., Lee, Y., Chang, H. (eds) Computer Science and its Applications. Lecture Notes in Electrical Engineering, Vol 203. Springer, 2012. https://doi.org/10.1007/978-94-007-5699-1_76
  26. M. Bagrami, N. Singhal, The Role of Cloud Computing Architecture in Big Data. In: Pedrycz, W., Chen, SM. (eds) Information Granularity, Big Data, and Computational Intelligence. Studies in Big Data, Vol 8. Springer, Cham, 2015. https://doi.org/10.1007/978-3-319-08254-7_13