• Title/Summary/Keyword: 훈련설계

Search Result 643, Processing Time 0.02 seconds

Research about CAVE Practical Use Way Through Culture Content's Restoration Process that Utilize CAVE (가상현실시스템(CAVE)을 활용한 문화 Content의 복원 과정을 통한 CAVE활용 방안에 대한 연구)

  • Kim, Tae-Yul;Ryu, Seuc-Ho;Hur, Yung-Ju
    • Journal of Korea Game Society
    • /
    • v.4 no.3
    • /
    • pp.11-20
    • /
    • 2004
  • Virtual reality that we have seen from the movies in 80's and 90's is hawing near based on the rapid progress of science together with a computer technology. Various virtual reality system developments (such as VRML, HMD FishTank, Wall Type, CAVE Type, and so on) and the advancement of those systems make for the embodiment of virtual reality that gives more sense of the real. Virtual reality is so immersive that makes people feel like they are in that environment and enable them to manipulate without experiencing the environment at first hand that is hard to experience in reality. Virtual reality can be applied to the spheres, such as education, high-level programming, remote control, surface exploration of the remote satellite, analysis of exploration data, scientific visualization, and so on. For some connote examples, there are training of a tank and an aeroplane operation, fumiture layout design, surgical operation practice, game, and so on. In these virtual reality systems, the actual operation of the human participant and virtual workspace are connected each other to the hardware that stimulates the five senses adequately to lend the sense of the immersion. There are still long way to go, however, before long it will be possible to have the same feeling in the virtual reality as human being can have by further study and effort. In this thesis, the basic definition, the general idea, and the kind of virtual reality were discussed. Especially, CAVE typed in reality that is highly immersive was analyzed in definition, and then the method of VR programming and modeling in the virtual reality system were suggested by showing the restoration process of Kyongbok Palace (as the content of the original form of the culture) that was made by KISTI(Korea Institute of Science and Technology Information) in 2003 through design process in virtual reality system. Through these processes, utilization of the immersive virtual reality system was discussed and how to take advantage of this CAVE typed virtual reality system at the moment was studied. In closing the problems that had been exposed in the process of the restoration of the cultural property were described and the utilization plan of the virtual reality system was suggested.

  • PDF

A Comparison of American and Korean Experimental Studies on Positive Behavior Support within a Multi-Tiered System of Supports (다층지원체계 중심의 긍정적 행동지원에 관한 한국과 미국의 실험연구 비교분석)

  • Chang, Eun Jin;Lee, Mi-Young;Jeong, Jae-Woo;ChoBlair, Kwang-Sun;Lee, Donghyung;Song, Wonyoung;Han, Miryeung
    • Korean Journal of School Psychology
    • /
    • v.15 no.3
    • /
    • pp.399-431
    • /
    • 2018
  • The purpose of this study was to summarize the empirical literature on implementation of positive behavior support (PBS) within a multi-tiered system of supports in American and Korean schools and to compare its key features and outcomes in an attempt to suggest future directions for development of a Korean school-wide PBS model and implementation manuals as well as directions for future research. Twenty-four American articles and 11 Korean articles (total 35 articles) that reported the outcomes of implementation of PBS at a tier 1 and/or tier 2, or tier 3 level and that met established inclusion criteria were analyzed using systematic procedures. Comparisons were made in the areas of key features and outcomes of PBS in addition to general methodology (e.g., participants, design, implementation duration, dependent measures) at each tier of PBS. The results indicated that positive outcomes for student behavior and other areas were reported across tiers in all American and Korean studies. At the tier 1 level, teaching expectations and rules were the primary focus of PBS in American and Korean schools. However, Korean schools focused on modifying the school and classroom environments and teaching social skills whereas American schools focused on teacher training on standardized interventions or curricular by experts and teacher support during implementation of PBS. At the tier 2 level, more American studies reported implementation of tier 2 interventions within school-wide PBS, and Check/In Check/Out (CICO) was found to be the most commonly used tier 2 intervention. The results also indicated that in comparison to Korean schools, American schools were more likely to use systematic screening tools or procedures to identify students who need tier 2 interventions and more likely to promote parental involvement with implementing interventions. At the tier 3 level, more Korean studies reported the outcomes of individualized interventions, but more American studies reported that designing individualized intervention plans based on comprehensive functional behavior assessment results and establishment of systematic screening systems were focused when implementing individualized interventions. Furthermore, few Korean studies reported the assessment of procedural integrity, social validity, and contextual fit in implementing PBS across tiers, indicating the need for development of valid instruments that could be used in assessing these areas. Based on these results, limitations of the study and suggestions for future research are discussed.

Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors (금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이)

  • Jeong-Ha Lee;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.17-42
    • /
    • 2016
  • Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.