• Title/Summary/Keyword: Cyber University

Search Result 2,791, Processing Time 0.034 seconds

Web-based Cyber Instruction for EFL Learning

  • Cha Mi-Yang
    • Journal of Digital Contents Society
    • /
    • v.6 no.4
    • /
    • pp.209-216
    • /
    • 2005
  • The aim of this study is to examine the effects of web-based cyber instruction on EFL learning from the viewpoint of learners` perceptions and needs. Data was collected through a questionnaire survey that was carried out with 709 undergraduate student enrolled in three cyber English courses offered at N university during the secind semester in 2004. The results of the study indicated that the learners exhibited a positive attitude towards web-based cyber instruction and considered it a paper educational method in the cyber age. However, the students perceived that web-based cyber instruction was not greatly satisfactory in terms of cultivating their English communicative competence or improving the language skills they needed. It was also found that cyber instruction was still teacher-dominant, lacking in interaction, which made the students passive recipients of informaton presented. In comparison with off-line instruction, cyber instruction was not particularly better in enhancing their motivation interest or concentration on class. To be more effective, cyber instruction needs to be equipped not only with a large variety of contents and class activities, but also with more exposure to authentic language by native English speakers. The finding of the investigation yield some implications for the design and development of web-based cyber EFL programs.

  • PDF

A Study on the Method for Activation of Cyber Class by Classification of Contents (콘텐츠 분류에 따른 사이버 수업 활성화 방안에 관한 연구)

  • Kim, kyung-hee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.920-923
    • /
    • 2007
  • Cyber Educations of University are increasing in development of Contents and spreading Internet Network. We need to classify a cyber education by the type, and analyze environment. In addition, We need a measurement of effectiveness and the research of method for activation of cyber education. In this paper, we classify into partial cyber which is mixed face-to face lecture and cyber lecture and full cyber which is organized all cyber lecture, and investigate a satisfaction of learner. We analysis also the problem in cyber classes according to their types, and propose a plan for activation.

  • PDF

Design of Target Cyber Counseling System using Counseling Assistance Agent

  • Pi, Su-Young
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.4 no.3
    • /
    • pp.311-315
    • /
    • 2004
  • Because of the characteristics of the cyber world, such as usefulness, anonymousness, patency, economic performance, rapidness, etc., cyber counseling has great possibility. Because he or she may not meet a consultant directly, a client can expose his/her inside problems or secret personal problems, keeping anonymousness. However, existing cyber counseling has the limit in durability of counseling because target counseling appropriate to a client is impossible and a counseling activity is done by one time counseling. In this paper, we attempt to develop a target cyber counseling system in which target cyber counseling is possible. The system will use a counseling assistance agent who can play the role of a counseling supporter as well as a counselor in the cyber space. If target counseling becomes possible, it can heighten efficiency of cyber counseling because a client is satisfied with the result of counseling and thus counseling activities can be continued.

The Trends of Next Generation Cyber Security (차세대 사이버 보안 동향)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1478-1481
    • /
    • 2019
  • As core technologies(IoT, 5G, Cloud, Bigdata, AI etc) leading the Fourth Industrial Revolution promote smart convergence across the national socio-economic infrastructure, the threat of new forms of cyber attacks is increasing and the possibility of massive damage is also increasing. Reflecting this trend, cyber security is expanding from simple information protection to CPS(Cyber Physical System) protection that combines safety and security that implements hyper-connectivity and ultra-reliability. This study introduces the recent evolution of cyber attacks and looks at the next generation cyber security technologies based on the conceptual changes of cyber security technologies such as SOAR(Security Orchestration, Automation and Response) and Zero Trust.

Analysis on Presidential Security Threat of Cyber Physical System by Cyber Attack Focusing Intelligent Building System (사이버물리시스템에 대한 사이버공격 경호위협 분석 - 지능형건물관리시스템을 중심으로 -)

  • Choi, Junesung;Lee, Sam Youl
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.669-672
    • /
    • 2020
  • In this paper, we analyzed the characteristics of cyber attacks and major threat scenarios that could occur around intelligent building management Systems(IBS) by cyber attack security threats against cyber physics systems. Generally determined that lowering the likelihood of aggression against predictable threats would be a more realistic approach to attack response. The countermeasures against this need to be applied to multi-layered defense systems, and three alternatives were proposed: preliminary cyber safety diagnosis for protection targets and the establishment of mobile security control systems.

Case Study on the Implementation of the Department of Early Childhood Education in a Cyber University (사이버대학교 유아교육학과의 강의 운영에 관한 사례연구 - H 사이버 대학교 '유아창의성교육' 수업 운영을 중심으로 -)

  • Kwon, Young-Ihm
    • Journal of the Korean Home Economics Association
    • /
    • v.45 no.3
    • /
    • pp.87-96
    • /
    • 2007
  • In order to efficiently improve teaching and learning methods of the department of Early Childhood Education in cyber universities, this research analysed and assessed the problems of the current situation of lectures of the department of early childhood education. Firstly, this research examined the characteristics of cyber-education and the lecturer's role in it. Secondly, the types and status of management of online-lectures were investigated. Finally, the student management and the variety of interaction taking place online were examined. The plan to vitalize the cyber-education of early childhood education that was suggested in this study was mainly focused on developing excellent educational contents and continual research of cyber-education's method of teaching and learning. Then for the activation of online interaction, technological support and teaching strategies are needed to activate online interaction.

A Survey on Security Issues of M2M Communications in Cyber-Physical Systems

  • Chen, Dong;Chang, Guiran
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.24-45
    • /
    • 2012
  • In this paper, we present a survey of security and privacy preserving issues in M2M communications in Cyber-Physical Systems. First, we discuss the security challenges in M2M communications in wireless networks of Cyber-Physical Systems and outline the constraints, attack issues, and a set of challenges that need to be addressed for building secure Cyber-Physical Systems. Then, a secure architecture suitable for Cyber-Physical Systems is proposed to cope with these security issues. Eventually, the corresponding countermeasures to the security issues are discussed from four aspects: access control, intrusion detection, authentication and privacy preserving, respectively. Along the way we highlight the advantages and disadvantages of various existing security schemes and further compare and evaluate these schemes from each of these four aspects. We also point out the open research issues in each subarea and conclude with possible future research directions on security in Cyber-Physical Systems. It is believed that once these challenges are surmounted, applications with intrinsic security considerations will become immediately realizable.

Sharing the Cyber Threat Intelligence on Cyber Crises: The Appropriate Role of the National Intelligence Agency (사이버위기에 대응하기 위한 국가정보기관의 사이버위협정보 공유 역할에 대한 고찰)

  • Kim, Daegeon;Baek, Seungsoo;Yoo, Donghee
    • Journal of Digital Convergence
    • /
    • v.15 no.6
    • /
    • pp.51-59
    • /
    • 2017
  • The role of government is to defend its lands and people from enemies. The range of that defense has now extended into the cyber domain, regarded as the fourth domain of the conventional defense domains (i.e., land, sea, sky, and universe). Traditionally, a government's intelligence power overrides that of its civilians, and government is exclusively responsible for defense. However, it is difficult for government to take the initiative to defend in the cyber domain because civilians already have a greater means for collecting information, which is known as being "intelligence inverse" in the cyber domain. To this end, we first define the intelligence inverse phenomenon and then analyze its main features. Then we investigate foreign countries' efforts to overcome the phenomenon and look at the current domestic situation. Based on these results, we describe the appropriate role of the National Intelligence Agency to handle cyber threats and offer a cyber threat intelligence model to share with civilians to help protect against these threats. Using the proposed model, we propose that the National Intelligence Agency should establish a base system that will respond to cyber threats more effectively.

Assortment and Price Analysis of Fashion Products according to the Types of Cyber Shopping Mall (사이버 쇼핑몰 유형에 따른 패션 제품의 구색과 가격 분석)

  • Kim, Yong-Sook;Kim, Hyun-Hee
    • The Research Journal of the Costume Culture
    • /
    • v.16 no.4
    • /
    • pp.775-783
    • /
    • 2008
  • Nowadays much amounts and various kinds of fashion products are sold through cyber shopping malls. Vendor type and intermediate type cyber shopping mall among many types of cyber shopping malls were selected to analyze assortment and price of fashion products. fashion products 'Best 100' from two cyber shopping malls were listed and classified. The results were as followed: First, the portion of fashion products at vendor type cyber shopping mall was higher than that of intermediate type. Second, fashion products items such as coat, Jacket, one-piece dress, sweater, t-shirt, pants, skirt, and underwear were sold at cyber shopping malls. Underwear and t-shirt were the best selling items at intermediate type shopping mall, and more expensive and fashionable coat, Jacket, and one-piece dress were the best selling items at vendor type shopping mall. Third, the price range of fashion items at vendor type shopping mall was higher than that of intermediate type shopping mall from 1,000 won to 99,000 won.

  • PDF

Summary of Maritime Cyber Attacks and Risk Management

  • Al-Absi, Mohammed Abdulhakim;Al-Absi, Ahmed Abdulhakim;Kim, Ki-Hwan;Lee, Young-Sil;Lee, Hoon Jae
    • International journal of advanced smart convergence
    • /
    • v.11 no.3
    • /
    • pp.7-16
    • /
    • 2022
  • The targets of cyber-attacks are not limited to the websites and internal IT systems of shipping agencies. Ships and ports have become important targets for cyber attackers. This paper examines the current state of ship network security, introduces the International Maritime Organization's resolution on ship network security management, and summarizing the cyber-attacks in maritime so the readers can have a general understanding of maritime environment.