• Title/Summary/Keyword: Cyber Training

Search Result 222, Processing Time 0.024 seconds

The Study on the Subjective Conceptualization of Social Work Professional to Consumerism in Social Welfare for the Disabled (장애인복지 소비자주의에 대한 사회복지전문직의 주관적 개념화 분석)

  • Park, Kyung-Su
    • Korean Journal of Social Welfare
    • /
    • v.58 no.4
    • /
    • pp.169-196
    • /
    • 2006
  • As social work practice for the disabled is still centered in provider's perspective in Korea, this study started with concerns for consumerism that is emerging as an alternative for the social work practice for the disabled. Consumerism is rooted in organization process of the disability rights movement, and considered as an ideology that protects actively the rights and influence of consumers. However, consumerism is not operating as an accomplished ideology yet, but as a type of the practical discourse. Consumerism is interpreted in multiaxial meanings and the conscituents of consumerism is used ambiguously in practice. This is because theoretical reviews on the conceptual thinking of consumerism are scant and empirical inquiries into conceptual cognition of social workers who uses this concept as a professional are scarce. After analyzing the data using Q methodology, the result shows that social workers' major cognitive types on consumerism perspective consists of four types; Empowerment type, Market-mechanism type, Multi-opening type and Traditional-value type. These types are classified by the dimension of 'specific/extended', 'traditional/reformative' and 'instrumental/autotelic'. This result will attribute to develop consumer-intimate policy, practice program and professional training program and to give facilities for lucid communication among policy, practice field, theory and movement in social welfare for disabled as it materializes the explicit conception of consumerism that is understood ambiguously in Korea.

  • PDF

Speaker Identification Using Dynamic Time Warping Algorithm (동적 시간 신축 알고리즘을 이용한 화자 식별)

  • Jeong, Seung-Do
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.5
    • /
    • pp.2402-2409
    • /
    • 2011
  • The voice has distinguishable acoustic properties of speaker as well as transmitting information. The speaker recognition is the method to figures out who speaks the words through acoustic differences between speakers. The speaker recognition is roughly divided two kinds of categories: speaker verification and identification. The speaker verification is the method which verifies speaker himself based on only one's voice. Otherwise, the speaker identification is the method to find speaker by searching most similar model in the database previously consisted of multiple subordinate sentences. This paper composes feature vector from extracting MFCC coefficients and uses the dynamic time warping algorithm to compare the similarity between features. In order to describe common characteristic based on phonological features of spoken words, two subordinate sentences for each speaker are used as the training data. Thus, it is possible to identify the speaker who didn't say the same word which is previously stored in the database.

A Study on the Subjective Perception Patterns of Social Workers to Corporate Philanthropy in Social Work Field (사회복지분야의 기업 사회공헌활동에 대한 사회복지사의 주관적 인식유형 연구)

  • Park, Kyung-Su
    • Korean Journal of Social Welfare
    • /
    • v.61 no.4
    • /
    • pp.109-136
    • /
    • 2009
  • This study started with concerns for corporate philanthropy that is emerging as an alternative for resource development of social work field in Korea. However, corporate philanthropy is not operating as an accomplished conception yet, but as a type of the practical discourse. Therefore corporate philanthropy is interpreted a multiplicity of meanings is used ambiguously in social work practice field. This is because theoretical reviews on the conceptual thinking of corporate philanthropy are scant and is in need of empirical inquires into conceptual perception of social workers who uses this concept as a stakeholder to corporate philanthropy. After analyzing the data using Q methodology, the result shows that social workers' major perception patterns on corporate philanthropy perspective consists of three patterns; Win-Win Partnership, Social-obligation, Strategic Materialism. These patterns are classified by the dimension of 'classical view', 'socio-economic view', 'modern view' and 'philanthrophic view'. This result will attribute to develop theories, social work practice program and social worker' training program related corporate philanthropy. And to give facilities for lucid communication among practice and theory in social work field as it materializes the explicit conception of corporate philanthropy that is understood ambiguously in Korea.

  • PDF

Security Education Training Program Characteristics needed to Development Task of Security Software in Security Majors of 5 Universities of Seoul Region (서울지역 5개 대학 보안 전공들의 보안소프트웨어의 개발 직무에 필요한 보안 교육 훈련 프로그램 특성)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.5
    • /
    • pp.16-22
    • /
    • 2020
  • In this paper, the technology and capabilities required for the job of developing security software recommended by the Cybersecurity Human Resources Development Framework of the National Initiative for Cybersecurity Education (NICE) were studied. In this paper, we describe what security skills are needed for the task of developing security software and what security capabilities should be held. The focus of this paper is to analyze the consistency between security technologies (core and specialized technologies) required for security software development tasks and the curriculum of information protection-related departments located in Seoul, Korea. The reason for this analysis is to see how the curriculum at five universities in Seoul is suitable for performing security software development tasks. In conclusion, if the five relevant departments studied are to intensively train developers of development tasks for security software, they are commonly required to train security testing and software debugging, how secure software is developed, risk management, privacy and information assurance.

A Study of the Performance of Virtual Education Systems (가상교육 지원 시스템 성능에 관한 연구)

  • Lee, Young-Houn;Kang, Seong-Guk;Kim, Myeong-Ryeol
    • The Journal of Korean Association of Computer Education
    • /
    • v.4 no.1
    • /
    • pp.77-85
    • /
    • 2001
  • The virtual education has extended its position as a new educational mean in the whole society. A lot of cyber campuses like the virtual training institutes and the remote colleges were newly formed. With the development of the technology related to the Internet, new systems that support smooth virtual education have appeared. But the systems that had no problems at first became low speed gradually with the increase of the learners and contents and there arose a lot of problems. The problems can be solved through upgrading the hardware equipments, but it needs a lot of expenses and there always exists waste of unnecessary system resources. Accordingly, this study is to test the performance of the server through the simulation under various situations and investigate the plan for improvement in order to grope for the plan that can improve the performance of the virtual education systems. It is fragmentary simulation. But if we would like to correct the server programs and complement it on the basis of these plans for improvement, we may expect the sufficient improvement of performance. Also it may have sufficient values as data for smooth virtual education.

  • PDF

Adaptive Keystroke Authentication Method for Online Test (온라인 시험을 위한 적응적 키보드 인증방법)

  • Ko, Joo-Young;Shim, Jae-Chang;Kim, Hyen-Ki
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.8
    • /
    • pp.1129-1137
    • /
    • 2008
  • E-learning as a new education trend is being applied not only to cyber school but also various education fields such as employee training for companies or interactive learning for consumers. Users of the E-learning can take online tests individually anywhere, to evaluate their achievement level. Because users who are taking the online tests may show their own IDs or passwords to others, the possibility of cheating is very high. Therefore, it is very important to authenticate the users. In this paper, we propose an adaptive-keyboard authentication method which depends on user behavior patterns through the use of IDs and passwords. This method does not need any additional devices or special effort. An adaptive method to update patterns in which IDs and passwords are entered was previously suggested and this new method has proved to be better than previous methods through simulations and implementation.

  • PDF

Analysis of NCS Curriculum for Computer Science Major in the 4th Industrial Revolution (4차 산업혁명 시대의 컴퓨터과학 전공자를 위한 NCS 교육과정 분석)

  • Jung, Deok-gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.6
    • /
    • pp.855-860
    • /
    • 2018
  • The IT technologies applying to IoT(Internet of Things), Big Data, and AI(Artificial Intelligence) are needed in the era of 4th industrial revolution. So, the IT convergence courses of computer science major which will be required in the companies in order to prepare the crises of 4th industry revolution are necessary. And, one approach to cope with this problem is the training of IT convergence man power based on NCS(National Competency Standard) education. In this paper, we propose and analyze the NCS education courses for computer science major in order to teach the students who are needed in the Korean domestic companies preparing the 4th industrial revolution. The skills and applications of Chatbot, Blockchain, and CPS(Cyber Physical System) for the post mobile and post Internet technologies are included in the proposed courses.

A Comparison on Major Curriculum of 2-Year, 3-Year, and 4-Year Health Administration Colleges in Korea (국내 보건행정(학)과의 학제별 전공교육과정 비교분석 연구)

  • Hwang, Chung-Il;Hwang, Jeonghae
    • Health Policy and Management
    • /
    • v.23 no.3
    • /
    • pp.224-232
    • /
    • 2013
  • Background: This study was a comparative analysis of the major curriculum for 2-year, 3-year, and 4-year colleges of the department of health administration in Korea. Methods: Among 45 Korean colleges registered with the department of health administration as of 2012, finally 25 colleges were selected by establishing the department of health administration more than 5 years ago, excluding government's financial support, and taking regional locations into account. Results: First, generally 2-year colleges was not the relationships between organizational philosophy/purposes and major course in comparison to those of 3-year or 4-year colleges. Second, the composition of credits in the major course appears to be higher for 3-year, 2-year, and 4-year colleges, respectively. Third, subjects related to basic medicine and medical records were included more often in 2-year, 3-year, and 4-year colleges, respectively, and health policy issues were covered more in 4-year, 3-year, and 2-year colleges, respectively. Fourth, the number of students per full-time professor in 2-year colleges was much higher than that in 3-year and 4-year colleges, and the employment rate of graduates for 4-year colleges was found to be higher than that for 2-year and 3-year colleges. Conclusion: Although this study has limitations with regard to the selection of research subjects, it provides baseline data for establishing the health administration required for training competent future professionals.

A Case Study of Recent New Terrorism and Potential Patterns in South Korea (최근 국외 뉴테러리즘의 사례분석과 국내 발생가능 유형에 대한 연구)

  • Jeon, Yong-Jae;Lee, Chang-Bae;Lee, Seung-Hyun
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.11-33
    • /
    • 2017
  • Terrorism has existed in the entire human history and has become a significant topic in criminology while prior studies has focused on North Korea as the perpetrator, and this prevents an in-depth discussion of the international trends of terrorism. As soft targets are the main target of new terrorism and because we never ignore the significance of the consequences, there are needs for more studies on the topic. This study conducted a case study of major terrorism attacks and surveyed professionals in the field via an AHP analysis in order to find the characteristics of terrorism and its potential patterns in South Korea. As a result, we found that North Korea or the left-wing may utilize homemade bomb, motor vehicle or drone for the purpose of attacking multi-use facilities in South Korea. For policy implications, we insist developing a better CPTED approach on those facilities, improving professionalism of cyber-watchdog via more training and education, stricter control on drone permit, and operation of counseling centers for preventing radicalization.

  • PDF

Following the Cold War, both the United States' military operational concept and the Republic of Korea Army's developmental study (탈냉전기 미국의 군사작전 개념과 한국군 발전방향 연구-합동작전을 중심으로)

  • Lee, Se-Han
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.121-163
    • /
    • 2004
  • Science technique development expanded into, not only land, sea, and air operations but also those of airspace, and cyber battle spaces. It is generally accepted at this time that space centric operations currently cannot be effectively divided from air operations. However, science and technology advancements make it possible to integrate Army, Navy, Airforce, and Marine forces into effective operations as never before. The Republic of Korea Armed Forces needs to establish a more effective joint concept. The US military, considered by many experts as the most effective in the world, understands the necessity of joint operations and accordingly has highly developed its own concept of joint operations. The US joint operational concepts demonstrated their effectiveness during the Iraqi War by dominating the battlefield through effective use of all combat and non-combat power. Following the US Iraqi War experience, the US Department of Defense continued to enhance Joint Capability through the acceleration of US Military Transformation involving all components. The future national security of the Republic of Korea, faced with the peculiarity of communist threat in the form of North Korea, and the conflicting interest of four strong powers; the United States, China, Japan, and Russia, depends on small but strong armed forces employing all available combat power through effective National and Military Strategy, and considering domestic and international constraints. In order to succeed in future wars, military operations following joint operational concepts must effectively employ all available combat power in a timely manner. The Republic of Korea Armed Forces must establish a joint forces concept in order to integrate all available combat power during employment. Therefore we must establish military operations that develop the military structure and organization, doctrine, weapon systems, training and education of our armed forces based on the key concept of joint operations.

  • PDF