• 제목/요약/키워드: 사이버정보

Search Result 2,488, Processing Time 0.028 seconds

Analysis of research trends on infants and school-age-child: Focusing on Journal of The Korean Society for School & Community Health Education from 2000 to 2023 (영·유아기 및 학령기 아동에 관한 연구동향 분석: 2000~2023년 한국학교·지역보건교육학회지 게재논문을 중심으로)

  • Hee-Jung Park;Minsung Sohn;Seok Hwan Kim
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.25 no.3
    • /
    • pp.39-49
    • /
    • 2024
  • Purpose: This study aims to analyze the current status of research related to infants and school-age-child published in the journal of Korean society for school & community health education from 2000 to 2023, with the goal of contributing to the future development and enhancement of the journal. Method: From 2000 to 2023, 52 papers were analyzed, comparing and classifying their journal topic, research types, data collection methods, and data analysis methods. Results: The results shows that the highest publication trend occurred between 2008 and 2012, with most studies focusing on school-age children. In terms of research topic, 'health behavior and health education' was the most frequent with 14 papers (26.9%), followed by oral health with 9 papers (17.3%), safety management with 7 papers (13.5%), and sexual awareness with 6 papers (11.5%). Quantitative research was the most common research type, with surveys being the primary data collection method. Descriptive statistics and t-test were the most frequently used data analysis methods. Conclusion: To enhance the quality of the journal of Korean society for school & community health education, there should be an expansion of evidence-based research focusing on infants and school-age children. Additionally, there is a need for greater diversity in research design, data collection, and analysis methods.

Research on the role of Smart Public Facilities -Focusing on public design policy- (스마트 공공시설물의 역할에 관한 연구 -공공디자인 정책을 중심으로-)

  • Son, Dong Joo
    • Journal of Service Research and Studies
    • /
    • v.14 no.3
    • /
    • pp.206-230
    • /
    • 2024
  • Background: The advancement of information and communication technology acts as a key driver in the implementation of smart cities. Smart Public Facilities leverage this technological progress to innovate urban operations, optimizing various city functions, enhancing the quality of public services, and improving citizens' accessibility and convenience. These Smart Public Facilities are introduced for the sustainable development of cities and the enhancement of citizens' quality of life. Method: This study systematically analyzed the public design policies of local governments and examined the use cases of Smart Public Facilities domestically and internationally to evaluate their functions and roles. Through this, the effectiveness and sustainability of public design policies were comprehensively reviewed, and the impact of Smart Public Facilities on urban operations and citizens' lives was analyzed from multiple perspectives. Results: The introduction of Smart Public Facilities significantly enhances the implementation and efficiency of public design policies, playing a crucial role in sustainable urban development and improving citizens' quality of life. Furthermore, positive impacts were observed in various areas such as energy management, transportation systems, and environmental monitoring. Major challenges included managing technological changes, ensuring data privacy and cybersecurity, and strengthening citizen participation. Conclusion: Smart Public Facilities serve as essential infrastructure for improving urban efficiency, sustainability, and citizens' quality of life. Successful implementation and operation require systematic management and citizen participation. Through this, Smart Public Facilities will support sustainable urban development and play a critical role in responding to environmental changes. To ensure that Smart Public Facilities function effectively as urban infrastructure, it is necessary to comprehensively evaluate their impact on the efficiency of public design policies, sustainability, citizens' quality of life, and the local economy, and to suggest concrete measures for their introduction and operation.

Development of Practical Problem-Based Home Economics Teaching.Learning Process Plans by Blended Learning Strategy - Focusing on a Unit 'the Youth and Consumer Life' - (Blended Learning(BL) 전략을 활용한 실천적 문제 중심 가정과 교수 학습 과정안 개발 - '청소년과 소비생활' 단원을 중심으로 -)

  • Lee, Jin-Hee;Chae, Jung-Hyun
    • Journal of Korean Home Economics Education Association
    • /
    • v.20 no.4
    • /
    • pp.19-42
    • /
    • 2008
  • The purpose of this study was to develop practical problem-based home economics teaching.learning process plans about a unit 'the youth and consumer life' of middle school eighth-grade Technology and Home Economics by applying blended learning(BL) strategy. According to ADDIE instructional design model, this study was conducted in the following procedure: analysis, design/development, implementation, and evaluation. In the stage of design and development, the selected unit was converted into a practical problem-based unit, and practical problem-based teaching. learning process plans were designed in detail by using BL strategy. An online study room for practical problem-based home economics instruction grounded in BL strategy was prepared by using Edunet(http://community.edunet4u.net/${\sim}$consumer2). Eight-session lesson plans were mapped out, and study aids for students and materials for teachers were prepared. In the implementation stage, the first-session teaching plans that dealt with a minor question 'what preparations should be made to become a wise consumer' were utilized when instruction was provided to 115 eighth graders who were in three different province, and the other one was in a middle school in the city of Daejeon. The experimental teaching was implemented for two weeks in the following procedure: preliminary program, pre-online learning, main instruction and post- online learning. The preliminary program was carried out in a session in the classroom, and pre-online learning was provided before the main instruction was given in a session in the classroom. After the main instruction was completed, post-online learning was offered. In the evaluation stage, a survey was conducted on all the learners and teachers to find out their opinions and suggestions.

  • PDF

Multi-dimensional Security Threats and Holistic Security - Understanding of fusion-phenomenon of national security and criminal justice in post-modern society - (다차원 안보위협과 융합 안보)

  • Yun, Min-Woo;Kim, Eun-Young
    • Korean Security Journal
    • /
    • no.31
    • /
    • pp.157-185
    • /
    • 2012
  • Today, the emergence of cyberspace and advancement of globalization caused not only the transformation of our productive and conventional life but also the revolutionary transition of use of destructive violence such as crime and warfare. This transition of environmental condition connects various security threats which separatedly existed in individual, local, national, and global levels in the past, and transformed the mechanical sum of all levels of security threats into the organic sum of multi-dimensional security threats. This article proposes that the sum of multi-dimensional security threats is caused by the interconnectivity of various different levels of security threats and the integrated interdisciplinary perspective is essential to properly understand the fundamental existence of today's security problem and the reality of fear that we face today. The holistic security, the concept proposed here, is to suggest the mode of networked response to multi-dimensional security threats. The holistic security is suggested to overcome the conventional divisional approach based on the principle of "division of labor" and bureaucratic principles, which means more concretely that national security and criminal justice are divided and intelligence, military, police, prosecution, fire-fighting, private security, and etc. are strictly separated into its own expertise and turf. Also, this article introduces integrated security approaches tried by international organization and major countries overseas with the respect of the holistic security. The author have spent some substantial experience of participant observation, meetings, seminar, conference, and expert interviews regarding the issues discussed in the article in various countries including the United States, Russia, Austria, Germany, Canada, Mexico, Israel, and Uzbekistan for the last ten years. Intelligence and information on various levels of security threats and security approaches introduced in this paper is obtained from such opportunities.

  • PDF

A study on an application of 'Virtual Reality Therapy' concerning a technology of real-time interaction. (실시간 상호작용 기술의 '가상현실치료' 적용에 관한 연구)

  • Kim, Jeong-Hwan
    • Cartoon and Animation Studies
    • /
    • s.22
    • /
    • pp.81-97
    • /
    • 2011
  • The technology of 'Virtual Reality' has placed in advanced tools for human beings' joy and anger together with sorrow and pleasure in our generation. It has recently tried in a variety ways to use as an implication for treatment in the field of Cognitive Psychology. Especially, it widely approaches to human in terms of that a sense of reality in a virtual world through the five senses should reinterpret the meaning of cognition in the real world. Based on this paradigm shift, it allows for new treatment using the technology of virtual reality. A typical example is a field of Therapy in order to overcome panic disorder. It has advantages that in particular development of flexible interaction technologies in a virtual space can lead patients to experience psychological environments rather than physical one. the interaction technology provides environments in which users' five senses can be actively stimulated, it is very useful that information from the experiences in the virtual world allows people to learn through real experiences by renewing potential energies, advantages of Virtual Reality Therapy can be customized treatment by depending on symptoms in patients with panic disorder and are capable of differentiate application for the cure at each stage. It is to treat by leading patients to get accustomed to environments and situations in real world through care process with each symptom and stage. It is helpful that based on A Human-Sensibility Ergonomics, technologies like immersive virtual reality equipment, force-relative feedback and stereophonic sound, and like stimulating the sense of smell make people to induce experiences by stimulating human's five senses. There are many advantages of immersion in virtual world in that the phenomenon such as challenge, interaction, reality, illusion, and cooperation is expanded. As an application for therapy by growing such augmented reality, virtual space and sharing of data through the Internet and also inexpensive its availability have recently expanded the base. There are other benefits of Virtual Reality Therapy offering active interaction environments for cognitive experience which can provide appropriately adjusted environments for patients who are hard to overcome the real situation because of phobia. In addition to that it is safe and economical and patients' confidentiality is assured. Moreover, due to the principles of applying real-time navigation the Virtual Reality Therapy makes modification and supplementation easier and also it can reduce cybersickness because of the supply of Lenticular allowing people to see stereoscopy without eyeglasses, which makes sense of presence clearer. On top of that due to the development of interactive technologies, it is becoming close to sense of reality similar to real world by leading users to navigate by themselves and to operate objects in a virtual space. This paper will therefore examine, although it is of limited, characteristics of application of virtual reality technology based on A Human-Sensibility Ergonomics used for treatment for a disorder. this paper will analyse a range of its application and problems and it will suggest the future possibilities.

  • PDF

A Study on Transfer Process Model for long-term preservation of Electronic Records (전자기록의 장기보존을 위한 이관절차모형에 관한 연구)

  • Cheon, kwon-ju
    • The Korean Journal of Archival Studies
    • /
    • no.16
    • /
    • pp.39-96
    • /
    • 2007
  • Traditionally, the concept of transfer is that physical records such as paper documents, videos, photos are made a delivery to Archives or Records centers on the basis of transfer guidelines. But, with the automation of records management environment and spreading new records creation and management applications, we can create records and manage them in the cyberspace. In these reasons, the existing transfer system is that we move filed records to Archives or Records centers by paper boxes, needs to be changed. Under the needing conditions of a new transfer paradigm, the fact that the revision of Records Act that include some provisions about electronic records management and transfer, is desirable and proper. Nevertheless, the electronic transfer provisions are too conceptional to apply records management practice, so we have to develop detailed methods and processes. In this context, this paper suggest that a electronic records transfer process model on the basis of international standard and foreign countries' cases. Doing transfer records is one of the records management courses to use valuable records in the future. So, both producer and archive have to transfer records itself and context information to long-term preservation repository according to the transfer guidelines. In the long run, transfer comes to be the conclusion that records are moved to archive by a formal transfer process with taking a proper records protection steps. To accomplish these purposes, I analyzed the 'OAIS Reference Model' and 'Producer-Archive Interface Methodology Abstract Standard-CCSDS Blue Book' which is made by CCSDS(Consultative committee for Space Data Systems). but from both the words of 'Reference Model' and 'Standard', we can understand that these standard are not suitable for applying business practice directly. To solve this problem, I also analyzed foreign countries' transfer cases. Through the analysis of theory and case, I suggest that an Electronic Records Transfer Process Model which is consist of five sub-process that are 'Ingest prepare ${\rightarrow}$ Ingest ${\rightarrow}$ Validation ${\rightarrow}$ Preservation ${\rightarrow}$ Archival storage' and each sub-process also have some transfer elements. Especially, to confirm the new process model's feasibility, after classifying two types - one is from Public Records center to Public Archive, the other is from Civil Records center to Public or Civil Archive - of Korean Transfer, I made the new Transfer Model applied to the two types of transfer cases.

The Myth of the Samsunghyeol through Communication Mathematic - Historical Analysis of The Goyangbu 3 (고양부 3을나의 3의 통신수학-역사적 분석을 통한 3성혈 신화 해석)

  • Lee, Seong kook;Lee, Moon Ho;Kim, Jeong Su
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.581-587
    • /
    • 2022
  • The water god, Venerable Bhadra, Indian Tammola (Tamla as the 'mol' and 'ju' characters were eliminated) came to Tamla with 900 Arahants(The highest Buddhist monks) around 563-483 BC. It is the propagation of Buddhism through the world's most sacred water (Heiligkeit). The traces of the three surnames of Goyangbu are the first samsunghyeol and the dwelling of the den of Jonjaam(cave of venerable Bhadra) in Yeongsil, giving a glimpse into the era of living in caves. The second is a link that is in line with 3, the basic number in the decomposition of 900 (=3*3*100) disciples of Bhadra, considering that 3 and 3 of the three surnames in Goyangbu are three times 9. At this time, 3 is the person of heaven and earth, religiously, marriage, hope, or complete number, and Jeju culture is resting everywhere. For example, 3 of the samsunghyeol, 3 of the 1, 2, 3 Dodong, 3 of the 3 Dado, 3 of the 3 Mudo, 3 of the 3 disasters, 3 of the Goyangbu 3-surnames, 3 of the house Olle Jeongnang and, among 900 (=3*3*100) disciples of Venerable Bhadra, the common factor is 3. It is the 'island of 3'. These papers consist of 1 and 2 parts. In Part 1, the name of Tamla came from Tammola, India, and 900 Indian Buddhist Arahants estimated that the three surnames in Goyangbu were the ancestors. Part 2 highlights how the basic principle of jeonganag derived from Indian customs has evolved and is being used in modern mobile communication and DNA gene life science.

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF