• Title/Summary/Keyword: 사이버 강의

Search Result 173, Processing Time 0.024 seconds

A Study on Development of Distance-Education System about Cyber Lecture Type through Component-Based Development on the WWW (WWW에서 컴포넌트 기반 사이버강의형 원격교육시스템 개발에 관한 연구)

  • Kim, Chang-Geun;Kim, Byung-Ki
    • The Journal of Korean Association of Computer Education
    • /
    • v.4 no.1
    • /
    • pp.27-34
    • /
    • 2001
  • Recently. The web-based distance education system becomes generalized so that learners can study without being under the control of time and space. This shows that it is more widely used through Internet in education field. But the previous developed methodology for distance-lecture system has some problems, on the Distance Education. It takes much time and cost. In this paper, the need of the Distance-lecture system to apply component-based developing methodology is suggested to overcome these problems. Also, you can save lots of time and cost because it has the reuse, the convenient availability, and the transplantation of distance-educaton system through component-based developing methodology.

  • PDF

A study on the System for Online education by Mobile (모바일 기반의 온라인교육 시스템에 관한 연구)

  • Song Eun-Jee
    • Journal of Digital Contents Society
    • /
    • v.6 no.3
    • /
    • pp.149-155
    • /
    • 2005
  • The various kinds of contents have been developed with the explosive increase of the internet users. The advantage of the contents could be extended to the extension of education. For the reason of no limit on space, on-line education such as cyber lecture and cyber university is getting popular. On-line education, however, could be faced to the problem of the management for attendance, homework and the exam. Therefore the proper supervision is requested so that students may get all the information for the calendar of test and other program which are necessary for the lesson. This study is to propose the system of education by mobile which is able to promote the efficiency of the study for the on-line education. The information of the lesson for cyber lecture could be accessed regardless the place and time by using the mobile phone which is usually carried.

  • PDF

A study on the cyber common operation picture for situational awareness in cyberspace (사이버공간 내 상황인식을 위한 사이버 공통 작전 상황도 연구)

  • Kim, Kook-jin;Youn, Jae-pil;Yoon, Suk-joon;Kang, Ji-won;Kim, Kyung-shin;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.87-101
    • /
    • 2022
  • Cyber-attacks occur in the blink of an eye in cyberspace, and the damage is increasing all over the world. Therefore, it is necessary to develop a cyber common operational picture that can grasp the various assets belonging to the 3rd layer of cyberspace from various perspectives. By applying the method for grasping battlefield information used by the military, it is possible to achieve optimal cyberspace situational awareness. Therefore, in this study, the visualization screens necessary for the cyber common operational picture are identified and the criteria (response speed, user interface, object symbol, object size) are investigated. After that, the framework is designed by applying the identified and investigated items, and the visualization screens are implemented accordingly. Finally, among the criteria investigated by the visualization screen, an experiment is conducted on the response speed that cannot be recognized by a photograph. As a result, all the implemented visualization screens met the standard for response speed. Such research helps commanders and security officers to build a cyber common operational picture to prepare for cyber-attacks.

Implementation of a Java Base Cyber Lecture Authorizing Tool (자바 기반 사이버 강좌 저작 도구의 구현)

  • 김일민;장은섭
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11b
    • /
    • pp.827-830
    • /
    • 2003
  • 인터넷의 등장과 통신기술의 발달로 인해 여러 분야에서 원격 교육이 이루어지고 있다. 이러한 결과로 인해 다양한 멀티미디어 기술을 활용한 컨덴츠의 저작이 일반화되고 있다. 이러한 컨텐츠는 전통적인 교실 수업과 같은 학습 효과를 얻기 위해 상호작용 적인 멀티미디어 컨텐츠를 도입하는 노력을 기울이고 있지만 아직 기능상에 많은 제약이 있다. 원격 교육을 위한 강의를 작성하기 위해서 강의자는 관련 프로그래밍 기술 등을 익혀야 하므로 상당한 관련 지식이 요구되어 가상강좌를 개설하기가 어려운 실정이다. 본 논문은 이러한 어려움을 해결하기 위하여 강의자와 학생의 학습을 효과적으로 지원하는 가상 강의 저작도구를 설계 및 구현함으로써 프로그래밍 지식이 없는 초보자도 윈도우 기반의 메뉴방식으로 정보 입력을 통해 교수의 강의와 학생의 학습을 효과적으로 지원하는 가상 강의 구축이 이루어 질 수 있도록 JVM(Java Virtual Machine)환경에서의 강의저작 및 재생 시스템 구현에 관한 논문이다. 이 시스템은 교수 강의 저작 도구를 구현하고, 수강생 개개의 학습이 가능하도록 저작된 강의를 재생함을 목적으로 하고있다.

  • PDF

A Study on the Quantitative Threat-Level Assessment Measure Using Fuzzy Inference (퍼지추론을 이용한 정량적 사이버 위협 수준 평가방안 연구)

  • Lee, Kwang-ho;Kim, Jong-Hwa;Kim, Jee-won;Yun, Seok Jun;Kim, Wanju;Jung, Chan-gi
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.19-24
    • /
    • 2018
  • In this study, for evaluating the cyber threat, we presented a quantitative assessment measures of the threat-level with multiple factors. The model presented in the study is a compound model with the 4 factors; the attack method, the actor, the strength according to the type of the threat, and the proximity to the target. And the threat-level can be quantitatively evaluated with the Fuzzy Inference. The model will take the information in natural language and present the threat-level with quantified data. Therefore an organization can accurately evaluate the cyber threat-level and take it into account for judging threat.

  • PDF

Vulnerability Mitigation System Construction Method Based on ATT&CK in M ilitary Internal Network Environment (국방 네트워크 환경에서 ATT&CK 기반 취약점 완화 체계 구축 방안)

  • Ahn, Gwang Hyun;Lee, Hanhee;Park, Won Hyung;Kang, Ji Won
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.135-141
    • /
    • 2020
  • The Ministry of National Defense is strengthening the power and capacity of cyber operations as cyber protection training is conducted. However, considering the level of enemy cyber attack capability, the level of cyber defense capability of the ministry of national defense is significantly low and the protection measures and response system for responding to cyber threats to military networks are not clearly designed, falling short of the level of cyber security capabilities of the public and private sectors. Therefore, this paper is to investigate and verify the establishment of a military internal network vulnerability mitigation system that applies the intention of attackers, tactics, techniques and procedures information (ATT&CK Framework), identified military internal network main threat information, and military information system security requirements with military specificity as factors that can establish a defense network vulnerability mitigation system by referring to the domestic and foreign cyber security framework It has the advantage of having.

Development of Cyber Counseling Program for Hospice (호스피스 사이버 상담을 위한 프로그램 개발)

  • Lee, Won-Hee;Oh, Eui-Geum;Kim, Cho-Ja;Kang, Kyu-Sook;Kang, Se-Won
    • Journal of Hospice and Palliative Care
    • /
    • v.8 no.2
    • /
    • pp.209-215
    • /
    • 2005
  • Purpose: The purpose of this study is to enhance the quality of life for the terminal patients and their family by providing counseling service through a hospice counseling homepage, thus activating hospice service and contributing to our national health. Methods: The study was methodologically conducted to assess the homepage developed and to professionally verify the counseling flow. Results: The cyber hospice homepage was developed between January 2004 and August 2004, whereby its counseling service was operated. The homepage included introduction, news (announcement), on-line lectures, community site for hospice clients, hospice counseling, and related links. As a result of assessing the site and of verifying the reliability of counseling service, the counseling flow was unanimously approved by the professionals. Conclusion: The cyber counseling for hospice was conducted to enhance the quality of life for the terminal patients and their family and to activate hospice service. It is required to train professional hospice cyber counselors and to establish systematic promotional strategies for activation of the cyber counseling site.

  • PDF

Research on Effects of Three Different Designs and Implementations on Cyber Education (정보활용기술 발전에 따른 효과적 사이버 교육을 위한 설계 및 구현의 차이에 대한 연구)

  • Ha, Tai-Hyun;Kang, Jung-Hwa
    • The Journal of Korean Association of Computer Education
    • /
    • v.6 no.4
    • /
    • pp.71-83
    • /
    • 2003
  • This study is aimed to develop and evaluate different approaches for cyber education. The project involved the development of sample cyber education programs using different design approaches, with built-in evaluation mechanisms. The different design approaches depend on what delivery technologies are involved. In the First Generation, the delivery technologies use text, flash and animation, whereas the synchronized content to video and audio are used in the Second and the Third Generations but the difference is the delivery method used by the videoclip. Tests were carried out through self-assessment to measure and analyze the efficient teaching. The results show that the Third generation technologies were the most effective method for cyber education. However, since the Third generation program is developed in multimedia, it tends 10 require higher development costs, and more advanced hardware and software as well as a higher bandwidth for network. Therefore, the research indicates that the development of technical supports, like loading speed, has to be solved simultaneously with the development of multimedia products for effective cyber education.

  • PDF

Interaction and Flow as the Antecedents of e-Learner Satisfaction (이러닝 만족도 영향요인으로서의 상호작용과 몰입)

  • Moon, Chul-Woo;Kim, Jae-Hyoun
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.3
    • /
    • pp.63-72
    • /
    • 2011
  • Satisfactory e-learning experience of working part-time adult students is a truly dynamic and multidimensional process that reflects learning needs and abilities. Special attention is given to understanding the role of student-to-faculty interaction, student-to-student interaction, e-learning content and course structure, flow, periodic off-line class meetings and synchronous Q&A sessions. Survey questions were developed and distributed to adult graduate students. Some of them were asked to complete the questions with the most interesting subjects or classes in their mind, and others with the most difficult subjects in their mind. The structural model for each group was tested. The values of path coefficients corresponding to the group with the difficult subjects turn out to be higher for the following paths; a) interaction among professors and students and satisfaction, b) contents quality and flow, c) Q&A and interaction among professors and students, d) Q&A and interaction among students. For the other paths such as interaction among students and satisfaction, contents structure and flow, the coefficient values corresponding to the group with the interesting subjects are higher. Some implications for e-learning design were provided as well.

  • PDF

A study on the application of mission-based weapon system cybersecurity test and evaluation (임무 기반의 무기체계 사이버보안 시험평가 적용 연구)

  • Kim, Ik-jae;Kang, Ji-won;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.71-81
    • /
    • 2021
  • This paper examines the ongoing research on ways to improve cybersecurity during the entire life cycle of weapons systems applied in advanced countries such as the United States, analyzes restrictions on obtaining domestic weapons systems, and presents effective security evaluation measures. By consistently performing mission-based risk assessment in the cybersecurity test and evaluation plan suitable for domestic circumstances at all stages of acquisition, important information is provided to major decision-making organizations in a timely manner to support decision-making, and to respond to identified vulnerabilities in cybersecurity. It is proposed to set the rules of engagement so that the protection measures can be verified, and a simulated invasion is proposed. In addition, the proposed cybersecurity test and evaluation system was compared with the domestic weapon system test and evaluation. Through this, the mission-based risk assessment element was grafted into the cybersecurity test and evaluation system research conducted so far to identify risks in a timely manner between acquisition projects, thereby supplementing the capability to support major decision-making.