과제정보
This work was supported by the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea (NRF-2022S1A5C2A04092269), and, this work was supported by the Korea Foundation for the Advancement of Science and Creativity(KOFAC) grant funded by the Korea government(MOE).
참고문헌
- Korea Intellectual Property Office, The Internet of Things (IoT) era, there is no thing without security! https://eiec.kdi.re.kr/policy/materialView.do?num=140627
- E. Choi and N. Park. Information Security Humanities in Jeju Story, Jeju National University Press, 2022.
- R. Di Pietro and S. Cresci, "Metaverse: Security and Privacy Issues", 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA, 2021, pp.281-288, http://dx.doi.org/10.1109/TPSISA52974.2021.00032.
- Personal Information Protection Commission, Infringement status of personal information. https://www.privacy.go.kr/front/contents/cntntsView.do?contsNo=39
- E. Yu. Size of Personal Information Leakage by Private Enterprises/Institution, Yu Euidong Councilor's office, 2023.
- E. K. Seo. "A Study on the Legislation of Personal Information Protection in China - Focusing on the Cyber security law. Journal of Sinology and China Studies", Vol. 72, No. 0, pp.131-155, 2017. http://dx.doi.org/10.18077/chss.2017.72..007
- Korea Internet & Security Agency. Status of China's personal information protection law administrative system and major violations, Korea Internet & Security Agency, 2021.
- S. -S. Park and S. -K. Han. "KASP-Integrated Learning Model for the Information Security Education in Elementary Education", Journal of The Korean Association of information Education (JKAIE), Vol. 14, No. 2, pp.157-164, 2010.
- Korean Statistical Information Service, Internet(OECD Member Country)https://kosis.kr/statHtml.do?orgId=101&tblId=DT_2KAAA13_OECD
- M. -S. Rhee. "Strengthening of Information Protection Education in Regular Schools", KIISC Review, Vol. 13, No. 6, pp.67-78, 2003.
- S. W. Tabor. "Narrowing the Distance: Implementing a Hybrid Learning Model for Information Security", Quartely Review of Distance Education, Vol. 8, Issue 1, pp.47-57,89, 2007.
- M. -S. Kang, T. -S. Kim, T. -Y. Kim. "Effects of Information Security Education on the Practice of Information Security for the Youth", Journal of Information Technology Applications and Management, Vol. 26, Issue 2, pp.27-40, 2019. https://doi.org/10.21219/jitam.2019.26.2.027
- B. -R. Kim, J. -W. Lee, B. -S. Kim. "Effect of Information Security Training and Services on Employees' Compliance to Security Policies", Informatization Policy, Vol. 25, No. 1, pp.99-114, 2018. https://doi.org/10.22693/NIAIP.2018.25.1.099
- D. Lee, N. Park. "Teaching Book and Tools of Elementary Network Security Learning using Gamification Mechanism", Journal of The Korea Institute of Information Security & Cryptology. Vol. 26, No. 3, pp.787-797, 2016. http://dx.doi.org/10.13089/JKIISC.2016.26.3.787
- N. Park. "Development and Application of Elementary Information Security Education STEAM Program through Simulation Hacking Play Activities", Journal of The Korean Association of Information Education, Vol. 20, No. 3, pp.273-282, 2016. https://doi.org/10.14352/jkaie.2016.20.3.273
- Y. Jung, E. Choi, N. Park. "Educational Aids for Teaching Hacking Principles to Strengthen Computational Thinking Skills to Elementary", Webology, Vol. 19, No. 1, pp.4527-4536, 2022. https://doi.org/10.14704/WEB/V19I1/WEB19299
- N. Park, N. Kang. "Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle", Sensors, Vol. 16, No. 1, p.20, 2016. https://doi.org/10.3390/s16010020
- D. Cary. China's Cyber, AI Talent Pipeline, CSET Policy Brief, Center for Security and Emerging Techonology, 2021.
- Ministry of Education of the People's Republic of China. Information Technology Curriculum Standards for Compulsory Education (2022 Edition), Beijing Normal University Publishing Group, 2022.
- J. Kim. "International Comparative Study of Curriculum in Information Education in Elementary Schools", The Journal of Korean Practical Arts Education, Vol. 29, No. 1, pp.55-77, 2023. https://doi.org/10.29113/skpaer.2023.29.1.04
- C. A. Tucker, Evaluating Beginning Textbooks. English Teaching Forum, No. 13, pp.355-361, 1975.
- A. Skierso, Textbook Selection and Evaluation, In M. Celce-Murcia (Ed.), Teaching English as a second or foreign language, Heinle and Heinle Publishers, 1991.
- Y. M. Kim. Comparative Study on the Computer Textbooks between India and Korean High school - for the Academic high school, Master Thesis. Konkuk University, Seoul, Korea, 2011.
- S. H. Moon. "A Study on ICT Conversion and Change of Industrial Society", The Journal of Convergence of Culture Technolgoy (JCCT), Vol. 7, No. 4, pp.653-658, 2021. http://dx.doi.org/10.17703/JCCT.2021.7.4.653
- J. W. Lee and N. Park, Encryption Scheme Supporting Range Queries on Encrypted Privacy Databases in Big Data Service Era, In: Yeo, SS., Pan, Y., Lee, Y., Chang, H. (eds) Computer Science and its Applications. Lecture Notes in Electrical Engineering, Vol 203. Springer, 2012. https://doi.org/10.1007/978-94-007-5699-1_76
- M. Bagrami, N. Singhal, The Role of Cloud Computing Architecture in Big Data. In: Pedrycz, W., Chen, SM. (eds) Information Granularity, Big Data, and Computational Intelligence. Studies in Big Data, Vol 8. Springer, Cham, 2015. https://doi.org/10.1007/978-3-319-08254-7_13