• Title/Summary/Keyword: 제4차 혁명시대

Search Result 185, Processing Time 0.026 seconds

The Aims of Education in the Era of AI (21세기 인공지능시대에서의 교육의 목적)

  • Ree, Sangwook;Koh, Youngmee
    • Journal for History of Mathematics
    • /
    • v.30 no.6
    • /
    • pp.341-351
    • /
    • 2017
  • In the 21st century, the era of artificial intelligence, it is demanded to make a change of the paradigm of education by the recent impact of the 4th industrial revolution. The education up to now has emphasized knowledge, meanwhile the human resources for the future are required to be armed with four C's: critical thinking, creativity, communication and collaboration capability, rather than being equipped with just knowledge. That is because the future society demands such abilities, especially the creativity of each individual. At this point, we are asked to consider the aim of education and teaching methods. In school education, students are to be respected and considered able to develop their potentials by themselves. They shouldn't be estimated by tests in the process of learning as they are now. We reconsider the aim of education here by taking a look at Whitehead's opinions and the present educational situations.

A Study on establishing the Role of Intelligence Agency on Cybersecurity - Focusing on Revision or Enactment of Cybersecurity related Bill - (정보기관의 사이버안보 역할 정립에 관한 연구 -사이버안보관련 법안 제·개정안을 중심으로-)

  • Yoon, Oh Jun;Kim, So Jeong;Jeong, Jun Hyeon
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.45-52
    • /
    • 2018
  • As the era of the 4th Industrial Revolution has progressed and the information and communication technologies have developed dramatically, the cyber threats will gradually become more intelligent and sophisticated. Therefore, in order to take systematic and prompt action in case of an accident while preparing measures against the threat, the role of intelligence agency is important. However, Korea is having difficulty in responding to the threats due to the lack of support for the national cybersecurity bill or the amendment bill of the National Intelligence Service. In this paper, I examine the cybersecurity function of the intelligence agency, the recent debate trends, and implications for the role of intelligence agency in our current situation. And then I intend to suggest some measures such as concentration on information gathering and analysis, enhancement of cyber threat prediction and response capacity, and strengthening of legal basis as a way to establish the role of intelligence agency for reinforcement of cybersecurity performance system.

  • PDF

A Study on Fabrication of Traditional Metal Craft Techniques Using 3D CAD (3D CAD를 이용한 전통금속공예기법 교보재 제작 연구)

  • Choi, San;Do, Eun-Ok;Huang, You-wei;Liang, You-Zhi;Park, Seung-Chul
    • Journal of Digital Convergence
    • /
    • v.18 no.3
    • /
    • pp.349-355
    • /
    • 2020
  • The Fourth Industrial Revolution has emerged, and technologies of various industries are being converged, compounded, or clouded computing, mobile, or big data. The emergence of a variety of skills and new jobs to match them is bringing the public out of the education and occupation of traditional metal crafts. In this change, craft education should find and study the education method suitable for the present times, and apply it to the educational field to raise public interest and revival. To this end, we will investigate the cases of education in other industries where new materials or technologies have been introduced, and use them in education of traditional metal craft techniques. In addition, we will investigate various cases and features of 3D printing technology and use it for education in craft techniques that have limited time, space and resources.

Life Satisfaction Depending on Digital Utilization Divide within People with Disabilities (스마트 도시(Smart City)의 데이터 경제 구현을 위한 개인정보보호 적용설계(PbD)의 도입 필요성 분석)

  • Jin, Sang-Ki
    • Informatization Policy
    • /
    • v.26 no.3
    • /
    • pp.69-89
    • /
    • 2019
  • In order to implement smart cities that will become living spaces in the fourth industrial revolution era, detailed privacy information such as residents' living information, buildings and facilities information must be collected and processed in real time. While city functions and convenience for individuals are being facilitated, threats to personal information exposure and leakage are also likely to increase at the same time. Therefore, the design concept for personal information protection should be considered and accordingly reflected from the stages of smart city design, technology development and operation planning of intelligent information (AI) facilities. The results of the analysis show that for activation of smart cities and operation of data-driven cities, the concept of Privacy by Design (PbD) has already been introduced in the institutional, industrial and technological aspects, particularly in the cases of European countries and the US. In order to strengthen the local and global competitiveness of smart cities and the country, Korea also needs to actively deploy PbD as a strategy to secure a data-driven economy, which is the core strategy for smart cities. Therefore, the study suggests policy implications focused on approaches to legislative improvement and technology development support, which reflect the basic properties of PbD as defined in the study.

Review of Domestic Literature Based on System Mapping for Computational Thinking Assessment (컴퓨팅 사고력 평가에 관한 시스템 매핑 기반 국내 문헌 고찰)

  • Choi, Sook-Young
    • The Journal of Korean Association of Computer Education
    • /
    • v.22 no.6
    • /
    • pp.19-34
    • /
    • 2019
  • With the advent of the 4th Industrial Revolution, the importance of solving problems through computing has been emphasized, and software education to improve computational thinking as a core competency has been designated as an essential subject. In order for education for computational thinking to be effective, appropriate tools for evaluating computational thinking must be supported. While studies on computational thinking have been conducted in the meantime, there have been no systematic studies on such evaluation-related studies. This study analyzed the related studies on the computational thinking assessment conducted in Korea and analyzed the previous research of the evaluation tools, evaluation criteria, and evaluation methods. Based on this, the implications for the study of computational thinking evaluation method were suggested.

A Study on the Reading Program Improvement Plan of a Public Library Based on the Reading Culture Promotion Policy (독서문화진흥 정책에 기반한 공공도서관의 독서 프로그램 개선 방안 연구)

  • Miah Cho;Seung-Jin Kwak
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.57 no.3
    • /
    • pp.191-210
    • /
    • 2023
  • The purpose of this study is to draw implications through domestic and international best case studies of library programs, and to suggest ways to improve a public library reading programs through analysis based on the 3rd Reading Culture Promotion Basic Plan in line with the changing role of future libraries. there is To this end, first, prior studies were analyzed from various angles to derive clustering standards for library programs. Based on this, programs of various domestic and foreign libraries were analyzed based on clustering criteria. And based on the clustering criteria of library programs and the 13 key tasks under the 4 strategies of the 3rd Reading Culture Promotion Basic Plan, the status of a specific public library reading programs was analyzed. Through this, in consideration of the demand of users in the era of the 4th Industrial Revolution, participatory reading promotion programs are expanded, and in response to the post-COVID-19 era, beyond face-to-face library services, non-face-to-face and non-contact library services are also considered. A development plan was presented. It is expected that this analysis and application attempt will ultimately go beyond the unit library and contribute to improving the public library service in Korea into a library program closely related to the lives of users.

Enhancement of Enterprise Security System Using Zero Trust Security (제로 트러스트 보안을 활용한 기업보안시스템 강화 방안)

  • Lee, Seon-a;Kim, Beom Seok;Lee, Hye in;Park, Won hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.214-216
    • /
    • 2021
  • It proposes a plan to strengthen the limitations of existing corporate security systems based on Zero-Trust. With the advent of the era of the Fourth Industrial Revolution, the paradigm of security is also changing. As remote work becomes more active due to cloud computing and COVID-19, security issues arising from the changed IT environment are raised. At the same time, in the current situation where attack techniques are becoming intelligent and advanced, companies should further strengthen their current security systems by utilizing zero trust security. Zero-trust security increases security by monitoring all data communications based on the concept of doubting and trusting everything, and allowing strict authentication and minimal access to access requestors. Therefore, this paper introduces a zero trust security solution that strengthens the existing security system and presents the direction and validity that companies should introduce.

  • PDF

A Study on the Application of the Capstone Design Course Intensive Course System in a Non-Face-To-Face Environment Using the Persona Technique (페르소나 기법을 활용한 비대면 환경에서의 설계교과목 집중이수제 적용 방안)

  • Yunja Hwang
    • Journal of Practical Engineering Education
    • /
    • v.15 no.2
    • /
    • pp.311-319
    • /
    • 2023
  • This study aims to break away from uniform academic regulations in preparation for nurturing future talents for the 4th industrial type, and apply the intensive course system to promote exchange and competition in the global education market. We would like to suggest a way to learn efficiently in an environment. To this end, we analyze the literature and prior research on design subjects in the intensive course system and non-face-to-face environment, analyze the requirements of teachers and students in charge of actual design subjects, and propose a utilization plan through expert review, and apply the persona technique. presented. This study will be able to provide basic data that can be practically used when operating intensive course design courses in the future.

Status and Prospect of Smart City in the Fourth Industrial Revolution Era (4차 산업혁명시대의 스마트시티 현황과 전망)

  • Kim, Ki-Bong;Kim, Geun-Chae;Cho, Han-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.191-197
    • /
    • 2018
  • With a population of more than 10 million people worldwide, MegaCity was only three in 1975, but it is expected to grow to 24 in 2013 and more than 30 in 2025 and more than 3 billion worldwide by 2050 It is expected to be absorbed into smart city. Especially in Asia and Africa, urbanization is expected to proceed rapidly. As the urbanization progresses and the population living in the cities increases, there are various problems such as rapid increase of energy consumption, congestion of traffic, various aging of the infrastructure and the like. As a result, smart city is emerging as a new alternative for solving urban problems. Smart City is rapidly expanding with the development of related technologies and can improve costs, improve urban services, improve quality of life, productivity and sustainability. Therefore, this paper analyzes the size and trend of the domestic and overseas smart city market, and analyzes the smart city related policies, trends and case studies of major countries to see the development status and market of smart city related industries, Present a business utilization model.

An Enhancement of The Enterprise Security for Access Control based on Zero Trust (제로 트러스트 기반 접근제어를 위한 기업 보안 강화 연구)

  • Lee, Seon-A;Kim, Beomseok;Lee, Hyein;Park, Wonhyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.265-270
    • /
    • 2022
  • With the advent of the Fourth Industrial Revolution, the paradigm of finance is also changing. As remote work becomes more active due to cloud computing and coronavirus, the work environment changes and attack techniques are becoming intelligent and advanced, companies should accept new security models to further strengthen their current security systems. Zero trust security increases security by monitoring all networks and allowing strict authentication and minimal access rights for access requesters with the core concept of doubting and not trusting everything. In addition, the use of NAC and EDR for identification subjects and data to strengthen access control of the zero trust-based security system, and strict identity authentication through MFA will be explained. Therefore, this paper introduces a zero-trust security solution that strengthens existing security systems and presents the direction and validity to be introduced in the financial sector.