• Title/Summary/Keyword: Credential System

Search Result 33, Processing Time 0.029 seconds

After-School Care and Education (방과후 아동지도)

  • Suh, Young-Sook;Park, Jin-Ock;Suh, Hye-Jeon
    • Korean Journal of Child Studies
    • /
    • v.30 no.6
    • /
    • pp.281-295
    • /
    • 2009
  • Representative services of the afterschool in Korea are After-Schools of the Ministry of Education, Science and Technology, Community Child Centers, After-school Child Care, and Youth After-school Academy of the Ministry of Health, Welfare and Family. Each service is distinguished with its own founded laws, subject children, specialists, principle management agent, a number of participants, and more. Research issues of afterschool are development of new afterschool programs, evaluatjon of the effectiveness of the afterschool, establishment of policies related to cooperative efforts among the different services of the afterschool, obtainment of legal status, and enhancement of the credential of its personnels. To guarantee the quality of the Afterschool and improve personnels' working conditions, various means are to be implemented. In regard to programatic and policy issues, the afterschool is needed to establish a system for training the afterschool coordinators and of its accreditation and to develop more child-centered afterschool programs. Also, it is needed to legislate fundamental law and consolidate communication system among the services of the Afterschool in pursue of their effective utilization and actual expansion.

  • PDF

Librarian Certification in Korea: History and Future Directions (사서자격제도의 변화 추이 및 개선 방향에 관한 고찰)

  • Kwack, Dong-Chul
    • Journal of Korean Library and Information Science Society
    • /
    • v.40 no.1
    • /
    • pp.339-361
    • /
    • 2009
  • Librarian certification and creditable library education in Korea are defined by law(s). The law(s) has continuously been amended or reformed to meet the changes in society as well as library surroundings to date. This research investigates and analyses the evolving traces of librarian certification and creditable library education law(s), and summaries them as following: first, the trend in the changes is reviewed, second, whether the conditions to grant librarian certificates reflected on the laws have influenced the quality or professional capability of the librarians is probed, finally, problems of current librarian certification and creditable library education are elicited, and desirable future directions are suggested.

  • PDF

Distributed Identity Authentication System based on DID Technology (DID 기술에 기반 한 분산 신원 인증 시스템)

  • Chai Ting;Seung-Soon Shin;Sung-Hwa Han
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.17-22
    • /
    • 2023
  • Traditional authentication systems typically involve users entering their username and password into a centralized identity management system. To address the inconvenience of such authentication methods, a decentralized identity authentication system based on Distributed Identifiers(DID) is proposed, utilizing decentralized identity technology. The proposed system employs QR code scanning for login, enhancing security through the use of blockchain technology to ensure the uniqueness and safety of user identities during the login process. This system utilizes DIDs and integrates the InterPlanetary File System(IPFS) to securely manage organizational members' identity information while keeping it private. Using the distributed identity authentication system proposed in this study, it is possible to effectively manage the security and personal identity of organization members. To improve the usability of the system proposed in this study, research is needed to expand it into a solution.

Health Educator System of Japan (일본의 건강교육사 제도)

  • Nam, Eun-Woo;Kim, Hye-Kyeong
    • Korean Journal of Health Education and Promotion
    • /
    • v.22 no.4
    • /
    • pp.257-273
    • /
    • 2005
  • Objectives: The study was to analyse health educator system of Japan and to suggest some implications to certification system of health education specialist in Korea. Methods: A content analysis carried out for the study which is an establishment the central operating organization, and curriculum of health educator system of Japan. Related documents of Japanese Association of Health Education were reviewed and personnel of the central operating body was interviewed in 2005. Result: Major findings were as follows: 1. Health educators in Japan were trained and certified through a non governmental organization, named Health Educator Training Organization in cooperation with Japanese Society of Health Education and Promotion. 2. Certification system was developed by Japanese Society of Health Education and Promotion, and health educators were certified through fulfillment of professional training and examination administered by Health Educator Training Organization. 3. The professional training sessions were held twice a year and the credential should be renewed every five years. 4. The eligibility of participation in the professional training sessions and renewal requirement were defined in the regulations of Health Educator Training Organization. 5. There were two kinds of health educators in Japan. The first one was a practical health educator, and the other was a professional health educator. The training for a professional health educator was more intensive than the practical one and consigned to a graduate school designated by Health Educator Training Organization. Conclusion: Review of operating system, clarity of operating process, and the development of renewal system of health education specialist would be necessary for the improvement of certification system in Korea.

A Design of Device Identification and Communication Method for Secure Device Monitoring based Smart Phone (스마트폰 기반에서 안전한 디바이스 모니터링을 위한 디바이스 식별 및 통신 기법 설계)

  • Jin, Byungwook;Ahn, Heuihak;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.69-78
    • /
    • 2017
  • As the smartphone-based devices are diffused and developed rapidly, they provide the convenience to the users. The abovementioned sentence technologies are being used not only in the existing sensor and wireless network technology but also in the application services of the diverse fields application services such as smart appliance, smart car, smart health care, etc. and the new fusion paradigm from the industry is presented by undertaking the researches in diverse area by the enterprises and research institutions. However, the smart environment exposes its weaknesses in the mobile terminal area, existing wireless network and IT security area. In addition, due to new and variant ways of attack, not only the critical information are disclosed However also the financial damages occur. This paper proposed the protocol to perform the smartphone-based safe device monitoring and safe communication. The proposed protocol designed the management procedure of registration, identification, communication protocol and device update management protocol and the safety against the attack techniques such as the an-in-the-middle-attack, impersonation attack, credential threat, information leaks and privacy invasion was analyzed. It was observed that the proposed protocol showed the performance improved by approximately 52% in the communication process than the existing system.

Study on Early Childhood Teachers' Professional Development Systems: Focused on America, England, and Australia (영유아교사 전문성 관련체제 고찰: 미국, 영국, 호주를 중심으로)

  • Kim, Myoung Soon;Shin, Yoon Seung;Lee, Se Won;Seo, Jai Wha
    • Korean Journal of Childcare and Education
    • /
    • v.12 no.4
    • /
    • pp.151-181
    • /
    • 2016
  • This study examined professional development systems in America, England, and Australia, and devised ways to enhance early childhood teachers' professional development in Korea. To suggest effective ways to improve current professional development system and its operation, this research aimed to investigate first, advanced professional development systems and policies in three countries, America, England, and Australia, second, the process of teacher qualification and requirements for acquiring teacher credential and its maintenance, and lastly, the effort of quality control for professional development, its operation, and evaluation systems in three countries. Based on the analysis of the three country's systems, five solutions for effective professional development are suggested. First, it is necessary to differentiate requirements for teachers by the level of teacher credentials. Second, an incessant training process for professional development is required. Third, an individualized professional development plan should be set for an individual teacher for the best outcomes in professional competence. Fourth, instructors for professional development trainings are needed to ensure the quality of training. Lastly, individuals, organizations, and policy and its operation systems need to be considered holistically as a whole in the perspective of convergence in policy making and its operation for effective professional development.

Construction of an Asymmetric Traitor Tracing Schemes with Anonymity (익명성을 보장하는 비대칭 공모자 추적 기법의 설계)

  • Lee, Moonsik;Kang, SunBu;Lee, Juhee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1231-1242
    • /
    • 2012
  • Traitor tracing schemes deter traitors from sharing their private keys by tracing at least one of the subscribers who were implicated in the construction of a pirate decoder. In general, it is assumed that the system manager in the scheme generates and distributes the subscribers' private key. But if the system manager knows the subscribers' private keys, he cannot convince a third party of a certain subscriber's piracy. To solve this problem, the system manager should not know the whole parts of subscribers' private keys and this leads to researches of asymmetric schemes. Moreover for the purpose of enhancing subscribers' privacy, there were two proposals of introducing anonymity onto asymmetric traitor tracing schemes, but one of them turned out to be a failure. In this paper, we point out that the other proposal also has flaws. We consider how to introduce anonymity to traitor tracing schemes, as a result, we suggest a new framework which is practical. We also construct a scheme by using an anonymous credential system and an asymmetric traitor tracing scheme. We prove the security of our scheme and consider the typical applications.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

A Study on Developing Qualification Criteria in the Private Security Industry (민간경비 자격검정 개선방안에 관한 연구)

  • Choe, Jung-Taek
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.143-167
    • /
    • 2009
  • As of entering the 21st century, a trend in the field of a private security industry among the advanced countries have been increased a qualification system and train session to meet the needs of professionalism. Intensifying the professionalism in Korea, education and train system has been initiated to change but the oligopoly market already formulated due to impractical selection standard and management of education system. Issuing certification and offering basic training through a designated institution for the purpose of improving quality of the private security industry worker, its practical effectiveness were lower than expectation. Rather certification-holder or security agency, institution or truster's rent-seeking behavior have been increased by occupational licensing system. The founded results, which were associated to problems in selecting and educating to the private security guard, in this study were that any verification has been initiated towards dual-system in official approval and structural problems in education system, and non-existence of verification for professionalism and management capability to security agency owner and its upper managerial level. Current a dual system in an officially authorized verification system and completion of security guard credential requested change to an unified official qualification verification system to solve those problems. Ranges of an applicant to the unified official qualification verification system should be extend to the whole population in the private security industry. Moreover, minimization of the dead-weigh loss, which is caused by oligopoly phenomenon while using its market-dominant status, increasement number of designated institution, which allows self-regulating competition, and endowment of autonomy, which is in selecting education and agency, were requested to solve the problems in selecting and educating to the private security guard. In order to minimize stated problems while maintaining objectiveness, a new manage and supervise institution, which is called a 'private security industry committee', should be establish. The private security industry committee is a formation of governance network which are participated from professional group to civil organization.

  • PDF

A study on the relationship of characteristics to job satisfaction among dental hygienists (치과위생사의 특성에 따른 직무만족도에 관한 조사 연구)

  • Park, Sung-Suk
    • Journal of Korean society of Dental Hygiene
    • /
    • v.8 no.1
    • /
    • pp.45-57
    • /
    • 2008
  • The purpose of this study was to examine the job satisfaction of dental hygienists at nine areas including professionalism. autonomy of job performance. backing system. relationship with colleagues. relationship with workers of higher and lower position. relationship with dentists. relationship with supporting departments, relationship with patients and compensation. The subjects in this study were 178 dental hygienists in dental hospitals and clinics. The survey was conducted from December. 2007 to January. 2008. Date were collected by self-administrated questionnaire. A SPSS 10.0 for Windows was used for statistical analysis. So try to for make basic data analysis recognition of enhance job satisfaction of dental hygienist. The findings of the study were as follows : 1. Regarding the relationship of career to job satisfaction. the dental hygienists who worked for one or two years were most satisfied in terms of professionalism. as they got a mean of 3.84. 2. As for connections between academic credential and job satisfaction. those who graduated from junior colleges expressed the best satisfaction at professionalism. since they got a mean of 3.75. 3. As to link between current service area and job satisfaction. the dental hygienists who worked in the region of Gyeong-nam were most gratified with professionalism. as they got a mean of 3.76. 4. Concerning relations between the type of workplace and job satisfaction. the dental hospital employees were most contented with professionalism. as they got a mean of 3.79. 5. In regard to the number of dental hygienists at current workplace and job satisfaction. those whose workplace hired 20 or 30 dental hygienists expressed the best satisfaction with the relationship with dentists. They got a mean of 3.94.

  • PDF